Upcoming Computer Security Seminars for 1/25/11

A couple interesting sounding computer security webinars are being presented today (Information from presenters sites):

Top Tips for Defending Against Database Threats in 2011
Please join us for our annual 2011 Database Security Top Threats and Tips webinar and learn more about the current threat climate and top tips for protecting sensitive information in the database.
2:00 pm – 3:00 pm EST By Application Security. 
Get the latest tips and trends to:


  • Defend against the latest cyber espionage methods including both insider and outsider attacks
  • Effectively manage separation of duties
  • Patch documented vulnerabilities
  • Protect against the latest SQL injections
  • Defend against social engineering attacks
  • Manage database security in the cloud
  • Protect against database rootkits and infection kits

Windows 7 Migrations and PC Lockdown with Privilege Management
Date: Tuesday, January 25, 2011 at 2PM EST
Speaker: Greg Shields, MVP and Windows Platform Expert, Concentrated Technology 

With the Windows XP sunset date fast approaching, plans for Windows 7 migrations are in full swing, prompting most organizations to also re-assess their approach to PC lockdown. With the advanced privilege management capabilities, enterprises have an alternative to the “all or nothing” approach to least privileges – because an “all or nothing” methodology prohibits organizations from meeting compliance, security and desktop operations goals. To ensure compliance enforcement, you’ll also need to consider compliance validation reporting and privileged account activity auditing.

Other Upcoming Security Seminars:

Data Security Simplified: Reducing Risk, Costs and PCI Scope with E3™ End-to-End Encryption

Upcoming SANS.org Webcasts:

January 27, 2011:
Analyst Webcast: A Real-Time Approach to Continuous Monitoring
Sponsored By: NetWitness, Splunk

January 28, 2011:
              Ninja Developers: Penetration Testing and Your SDLC

January 31, 2011:
              From Exposure to Closure – The life and times of an exploitable Vulnerability An Industrial Control Systems View 

February 01, 2011:
Analyst Webcast: Remote Administration and Security Compliance
Sponsored By: Netop
February 02, 2011:
Tool Talk: Pre-flight Checklists & Seatbelts for Your Applications Trip to the Cloud
Sponsored By: Veracode
February 03, 2011:
Improve firewall security odds: Prevent misconfigurations and compliance concerns by automating firewall audits.
Sponsored By: Skybox Security, Inc.
February 09, 2011:
Internet Storm Center Threat UpdateISC Webcast
Sponsored By:
February 11, 2011:
Proactive Compliance for PCI-DSS
Sponsored By: NitroSecurity

February 24, 2011:
             Continuous Monitoring: NOT Harder Than It Looks
             Sponsored By: Tripwire, Inc.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.