Enterprise Under Attack: Dealing with Security Threats and Compliance

By: The Outsourcing Institute
 
Sept. 13, 2013 - PRLog -- A security hole in an application can have far-reaching business impacts, causing not only major financial loss but also loss of customer confidence, trust and reputation. Fortunately, there are well-established industry practices to identify and secure applications from breaches while adhering with regulatory compliance.

This webinar will cover the range of security threats to enterprise applications and will discuss, in depth, how to secure your applications, including web applications, mobile applications and infrastructure. The webinar will also prepare you to achieve peak levels of security as well as ensure that you remain in regulatory compliance.

Our expert featured speakers will discuss the following:

The security threats to applications and critical environments
How to assess the required level of security testing for any application
Compliance with regulations such as PCI-DSS, HIPAA, SOX etc., while ensuring strong security
Continuous security testing to reduce cost of failure

Featured Expert Speakers:

Rajnish Mohan, Sr. Vice President and Center Director, SPAN Infotech (India) Pvt. Ltd.
Lakshminarasimha Manjunatha Mohan, Solution Architect,SPAN Infotech (India) Pvt. Ltd.
Tony Mataya, Principal, Avasant

Secure your business with the latest information from this webinar.

Date:  October 3, 2013
Registration: www2.gotomeeting.com/register/567115874

Sponsored By: Span Systems
End
Source:The Outsourcing Institute
Email:***@outsourcing.com
Tags:Outsourcing, Security, Threat, Technology
Industry:Technology, Software
Location:United States
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
Outsourcing Institute PRs
Trending News
Most Viewed
Top Daily News



Like PRLog?
9K2K1K
Click to Share