Enterprise Security Landscape: Risks and Controls
(Streaming Film)

Book Cover
Average Rating
Contributors
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Published
[San Francisco, California, USA] : Kanopy Streaming, 2015.
Format
Streaming Film
Language
Undetermined

Notes

General Note
Title from title frames.
General Note
In Process Record.
Date/Time and Place of Event
Originally produced by SmartPros in 2013.
Description
Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise security landscape and offers advice and best practices to protect your sensitive financial data from unauthorized access and cyber-attack. Learning Objectives: Upon successful completion of this segment, you should be able to: recognize the changing nature of security threats; identify controls to protect the organization's infrastructure and data from security breaches and cyber-attack; recognize the control issues brought about by cloud computing and the emerging IT trends, Big Data and Big Data analytics; identify best practices to help accounting and finance professionals to cope with ever-changing security threat scenarios
System Details
Mode of access: World Wide Web.

Citations

APA Citation, 7th Edition (style guide)

(2015). Enterprise Security Landscape: Risks and Controls . Kanopy Streaming.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

2015. Enterprise Security Landscape: Risks and Controls. [San Francisco, California, USA]: Kanopy Streaming.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Enterprise Security Landscape: Risks and Controls [San Francisco, California, USA]: Kanopy Streaming, 2015.

Harvard Citation (style guide)

(2015). Enterprise security landscape: risks and controls. [San Francisco, California, USA]: Kanopy Streaming.

MLA Citation, 9th Edition (style guide)

Enterprise Security Landscape: Risks and Controls Kanopy Streaming, 2015.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

MARC Record

Grouped Work ID
576373d8-d835-b638-4d34-0fd230450101-und
Go To Grouped Work

Grouping Information

Grouped Work ID576373d8-d835-b638-4d34-0fd230450101-und
Full titleenterprise security landscape risks and controls
Authorkanopy
Grouping Categorymovie
Last Update2024-04-30 15:17:32PM
Last Indexed2025-02-08 02:44:28AM

Book Cover Information

Image Sourcesideload
First LoadedNov 2, 2024
Last UsedNov 2, 2024

Marc Record

First DetectedAug 17, 2023 05:27:31 PM
Last File Modification TimeApr 30, 2024 03:18:17 PM

MARC Record

LEADER02109ngm a2200337za 4500
001kan1114973
003CaSfKAN
006m     o  c        
007vz uzazuu
007cr una---unuuu
008150908p20152013cau035        o   vlund d
02852|a 1114973|b Kanopy
035 |a (OCoLC)921957373
040 |a VDU|b eng|c VDU
24500|a Enterprise Security Landscape: Risks and Controls
264 1|a [San Francisco, California, USA] :|b Kanopy Streaming,|c 2015.
300 |a 1 online resource (streaming video file)
306 |a Duration: 36 minutes
336 |a two-dimensional moving image|b tdi|2 rdacontent
337 |a computer|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
500 |a Title from title frames.
500 |a In Process Record.
518 |a Originally produced by SmartPros in 2013.
520 |a Course Overview As our society grows increasingly interconnected through the Internet and a myriad of wired and wireless devices, managing the security of critical company information becomes more and more of a challenge. In our final segment, Jack Danahy, Director of Advanced Security at IBM, examines the current global enterprise security landscape and offers advice and best practices to protect your sensitive financial data from unauthorized access and cyber-attack. Learning Objectives: Upon successful completion of this segment, you should be able to: recognize the changing nature of security threats; identify controls to protect the organization's infrastructure and data from security breaches and cyber-attack; recognize the control issues brought about by cloud computing and the emerging IT trends, Big Data and Big Data analytics; identify best practices to help accounting and finance professionals to cope with ever-changing security threat scenarios
538 |a Mode of access: World Wide Web.
653 |a Business Skills
653 |a Leadership Training
7102 |a Kanopy (Firm)
85640|u https://losgatosca.kanopy.com/node/114974|z A Kanopy streaming video
85642|z Cover Image|u https://www.kanopy.com/node/114974/external-image