Security & Risk Management

Emerging IT Trends and Their Impact on Security Policies (Straight Talk)

Course Overview
Over the past decade we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever devices that keep today's mobile workforce productive and on the move. However, with all the good news associated with these impressive technological achievements, come some significant challenges, particularly in the critical area of privacy and security.

In this report, expert Kevin Jones, Senior Information Security Engineer for Thycotic Software, explores the impact ''technology change'' is having on enterprise security policies. By viewing this report, IT and business professionals will be better able to keep their security policies up-to-date and keep damaging internal and external threats and attacks at bay.


Track: Straight Talk
Straight forward explanations of key technologies and their business value




Learning Objectives:

Upon successful completion of this segment, you should be able to:

  • Discuss the global IT landscape and how emerging technologies are impacting enterprise security policies;
  • Understand how to approach enterprise security policies, standards and procedures today;
  • Identify items that often fall through the cracks when it comes to enterprise security policies.

Content Partner:

WatchIT


Speaker / Author:

Photo of Kevin Jones

Kevin Jones is a senior IT security engineer with Thycotic Software, a software company specializing in security management solutions for enterprise and government IT administrators. Kevin Jones has specialized in a variety of cybersecurity initiatives in the privileged management space. As Senior Information Security Engineer for Thycotic Software, Kevin brings a deep understanding of cryptography and cryptographic systems, as well as advanced threat modeling to the design and implementation of enterprise and government security software. A Microsoft MVP, Kevin has been a featured podcast speaker at ZDNet, as well as a presenter at numerous IT and security events, including IANS Forums, ISSA, ISACA and software development clinics.

Software & Hardware Requirements:

  • 56k or Greater Internet Connection
  • Adobe Acrobat® Reader for the .pdf files
  • Adobe® Flash® Player 9 or higher
  • Modern DHTML Compatible Browser
  • Ram: 256 MB minimum
  • Sound card with speakers/headphones
  • Windows or Mac OS

Buy

Price (USD)

Standard Rate: $29.00
Subscribers: $29.00
Pillsbury U Online: $29.00
Metro State Univ: FREE

Details

Course Code : WIT-1889

Release Date: 07/01/2016
Expire Date: 08/01/2018
Credits:
PMI PDU 0.50

Course Level: N/A

Passing Grade: 70%
Format Type: eLearning

Returning Subscribers

Login
- OR -
Login