Thursday, February 26, 2009

Intrusion Defense Security School: The Challenges of Web 2.0

February 26, 2009 Published by

Content Alert
About the Sponsor

Websense, Inc.
Websense Inc. is the global leader in web filtering, and a premier provider of web security software. Websense products secure organizations from emerging internet threats and deliver flexible, integrated policy enforcement throughout organizations.
> Click here for more information

Web 2.0 is the next generation of web-based applications that enable content to be generated and shared in real time, promoting more communication between users. However, today's companies must proactively address the security risks of technologies using Web 2.0 to effectively mitigate the risks of data loss and leakage.

The expert videocast and podcast featured here provide an overview of the risks of Web 2.0 software and discuss the security advantages of cloud computing and software as a service (SaaS) for protecting confidential information.

Click here to watch Web 2.0 Threats: What You Should Know

Click here to listen to The Security Risks of Cloud Computing

SPEAKER: David Sherry, CISSP, CISM - CISO, Brown University
SPONSOR :   Websense, Inc.

Videocast: Web 2.0 Threats: What You Should Know

Check out this expert videocast and learn about:

  • The benefits and risks of Web 2.0 software
  • Popular Web 2.0 attack vectors and scenarios that your company should know about
  • Technology best practices, defensive policies, and Web 2.0 trends that security professionals should monitor to maintain overall security

Podcast: The Security Risks of Cloud Computing

Check out this expert podcast and learn about the benefits and risks of cloud computing and SaaS options for your organization and get expert tips and strategies for addressing the challenges of these services.


David Sherry, CISSP, CISM - CISO, Brown University

As chief information security officer of Brown University, David Sherry is charged with the development and maintenance of Brown's information technology security strategy, IT policies and best practices, security training and awareness programs, as well as ongoing risk assessment and compliance tasks. Sherry has 20 years of experience in information technology. He most recently worked at Citizens Bank where he was vice president for enterprise identity and access management, providing leadership for compliance and security governance. He had also served as Citizens' vice president for enterprise information security, overseeing the company's security operations and controls. He has taught classes at colleges in both Massachusetts and Rhode Island, as well as spoken on identity management strategy and implementation at industry conferences. He holds undergraduate and graduate degrees in business management.

Get informed. Check out all our available webcasts to get the information you need to make the right IT Business decisions from leading industry experts and vendors.

View all Webcasts

  A B O U T   T H I S   A L E R T

This e-newsletter is published by, part of the TechTarget network. TechTarget provides IT professionals with the resources they need to perform their jobs: Web sites, newsletters, forums, blogs, white papers, webcasts, events and more.

Copyright 2009 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

If you no longer wish to receive Webcast Alert from go to unsubscribe:

Unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

Please note, this will not affect any other subscriptions you have signed up for.

Contact Us:
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy: PRIV LINK

No comments:

Post a Comment