Emerging IT Trends

Contributor(s): WatchIT (Firm) [dst] | Kanopy (Firm) [dst]
Publisher: WatchIT, 2017Publisher: [San Francisco, California, USA] : Kanopy Streaming, 2018Description: 1 online resource (streaming video file) (27 minutes): digital, .flv file, soundContent type: two-dimensional moving image Media type: computer Carrier type: online resourceSubject(s): Career Development | TrainingGenre/Form: Education films. Online resources: A Kanopy streaming video | Cover Image Kevin JonesSummary: Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever devices that keep today's mobile workforce productive and on the move. However, with all the good news associated with these impressive technological achievements come some significant challenges, particularly in the critical area of privacy and security. . In this report, expert Kevin Jones, Senior Information Security Engineer for Thycotic Software, explores the impact ''technology change'' is having on enterprise security policies. By viewing this report, IT and business professionals will be better able to keep their security policies up-to-date and keep damaging internal and external threats and attacks at bay.. After successfully completing this segment you should be able to:. • Understand the key security concepts that professionals need to recognize and comprehend. • Discuss the difference between a risk-centric and a threat-centric approach to security. • Identify the key elements often missed with risk management programs and processes
Item type Current location Call number Status Date due Barcode Item holds
 Kanopy Kanopy Digital Library
Available
Total holds: 0

Title from title frames.

Film

In Process Record.

Kevin Jones

Originally produced by WatchIT in 2017.

Over the past decade, we have witnessed a true paradigm shift in global computing. This technological revolution has been led by familiar players such as the Internet, wireless communication and Cloud Computing and is complimented by a host of clever devices that keep today's mobile workforce productive and on the move. However, with all the good news associated with these impressive technological achievements come some significant challenges, particularly in the critical area of privacy and security. . In this report, expert Kevin Jones, Senior Information Security Engineer for Thycotic Software, explores the impact ''technology change'' is having on enterprise security policies. By viewing this report, IT and business professionals will be better able to keep their security policies up-to-date and keep damaging internal and external threats and attacks at bay.. After successfully completing this segment you should be able to:. • Understand the key security concepts that professionals need to recognize and comprehend. • Discuss the difference between a risk-centric and a threat-centric approach to security. • Identify the key elements often missed with risk management programs and processes

Mode of access: World Wide Web.

In English

There are no comments for this item.

to post a comment.