Enterprise Security Landscape: Risks and Controls
(eVideo)

Book Cover
Average Rating
Contributors
Published
[San Francisco, California, USA] : Kanopy Streaming, 2015.
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Format
eVideo
Language
und

Notes

General Note
Title from title frames.
General Note
In Process Record.
Date/Time and Place of Event
Originally produced by SmartPros in 2013.
Description
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise security landscape and offers advice and best practices to protect your sensitive financial data from unauthorized access and cyber-attack. Learning Objectives: Upon successful completion of this segment, you should be able to: recognize the changing nature of security threats; identify controls to protect the organization's infrastructure and data from security breaches and cyber-attack; recognize the control issues brought about by cloud computing and the emerging IT trends, Big Data and Big Data analytics; identify best practices to help accounting and finance professionals to cope with ever-changing security threat scenarios
System Details
Mode of access: World Wide Web.

Citations

APA Citation, 7th Edition (style guide)

(2015). Enterprise Security Landscape: Risks and Controls . Kanopy Streaming.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

2015. Enterprise Security Landscape: Risks and Controls. Kanopy Streaming.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Enterprise Security Landscape: Risks and Controls Kanopy Streaming, 2015.

MLA Citation, 9th Edition (style guide)

Enterprise Security Landscape: Risks and Controls Kanopy Streaming, 2015.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
576373d8-d835-b638-4d34-0fd230450101-und
Go To Grouped Work

Grouping Information

Grouped Work ID576373d8-d835-b638-4d34-0fd230450101-und
Full titleenterprise security landscape risks and controls
Authorkanopy
Grouping Categorymovie
Last Update2024-01-09 10:36:48AM
Last Indexed2024-04-27 03:40:33AM

Book Cover Information

Image Sourcesideload
First LoadedAug 6, 2022
Last UsedMar 17, 2024

Marc Record

First DetectedJun 24, 2022 10:10:03 AM
Last File Modification TimeDec 04, 2023 01:03:53 PM

MARC Record

LEADER02116ngm a2200337za 4500
001kan1114973
003CaSfKAN
006m     o  c        
007vz uzazuu
007cr una---unuuu
008150908p20152013cau035        o   vlund d
02852|a 1114973|b Kanopy
035 |a (OCoLC)921957373
040 |a VDU|b eng|c VDU
24500|a Enterprise Security Landscape: Risks and Controls
264 1|a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2015.
300 |a 1 online resource (streaming video file)
306 |a Duration: 36 minutes
336 |a two-dimensional moving image|b tdi|2 rdacontent
337 |a computer|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
500 |a Title from title frames.
500 |a In Process Record.
518 |a Originally produced by SmartPros in 2013.
520 |a Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise security landscape and offers advice and best practices to protect your sensitive financial data from unauthorized access and cyber-attack. Learning Objectives: Upon successful completion of this segment, you should be able to: recognize the changing nature of security threats; identify controls to protect the organization's infrastructure and data from security breaches and cyber-attack; recognize the control issues brought about by cloud computing and the emerging IT trends, Big Data and Big Data analytics; identify best practices to help accounting and finance professionals to cope with ever-changing security threat scenarios
538 |a Mode of access: World Wide Web.
653 |a Business Skills
653 |a Leadership Training
7102 |a Kanopy (Firm)
85640|u https://mcculloughlibrary.kanopy.com/node/114974|z A Kanopy streaming video
85642|z Cover Image|u https://www.kanopy.com/node/114974/external-image