Last week Carol Ferrara Zarb, industry solution manager sat down with me and talked about the work being done at Cisco around helping merchants address the Payment Card Industry Data Security (PCI DSS) 2.0 standards released last year.
Cisco will be hosting a webinar april 14th 10:00am PT hosted by Lindsay Parker, global director of retail industry marketing with guests including:
Christopher Novak, Managing Principal, Investigative Response, Verizon Business Security Solutions
Danny Dhillon, Principal, Security Engineer, RSA
Rob McIndoe, Senior Security Consultant, Verizon Business Security Solutions
where Carol Zarb and Cisco retail architect Christian Janoff will discuss Cisco’s solution to help merchants address and maintain PCI compliance.
Some facts about Cisco and Payment Card Industry Data Security Standards (PCI DSS)
Securing smartphones and tablets used for work protects both the employee and the business.
More of your employees are using personal consumer devices for work than you may realize. The majority of them probably carry an Internet-enabled smartphone, like an iPhone, a BlackBerry, or an Android phone, and some may even be using an iPad for work, too. And employees are using these devices to access and work with the company data they need to do their jobs. Like the computers at your office, employees’ personal devices should be secured to protect both the business assets on your network and any sensitive data on employees’ personal devices.
From joint reference architectures to education webcasts, the collaboration between Cisco and Rockwell Automation benefits manufacturers. The partnership has empowered corporations globally and now industry experts from both companies are ready to share their best practices and lessons learned.
Thursday, April 28
9:00 a.m. PST / 10:00 a.m. MST / 11:00 a.m. CST / 12:00 p.m. EST
Growing demands for greater information access accelerate the convergence of manufacturing and enterprise networks and help manufacturers make better business decisions. As critical control systems link to company-wide infrastructures and beyond, new risks emerge that can affect productivity, operational efficiency and functional safety. To ensure the benefits derived from plantwide convergence outweigh risks and threats, it is imperative to follow contemporary architecture design practices that can enhance network resiliency and help protect key assets and information.
Learn From Industry Experts
Speakers Scott Johnston, Principal Consultant for Network & Security Services, Rockwell Automation and Bryce Barnes, Enterprise Vertical Solutions Architect for Manufacturing, Cisco, will discuss the solutions from Rockwell Automation and Cisco to address the challenges of network convergence. Learn the fundamentals and best practices for:
Securing manufacturing computing and controller assets
The value a Demilitarized Zone (DMZ) brings to your manufacturing framework
How FactoryTalk Services and Applications such as FactoryTalk ViewPoint and FactoryTalk
Transaction Manager can be deployed within the manufacturing framework to leverage the DMZ
While the IT industry is in many ways moving toward an outsourced model, with the widespread adoption of the cloud and XaaS, marketing has been moving in a similar direction as well. And while PR agencies have been around for quite some time and it has been normal to look to outside agencies for help with creatives, over the past several years a new kind of service provider, the Email Service Provider, or ESP, has emerged from the shadows. Not to be mistaken for cloud-based email security services, ESPs are in the business of sending mass email (typically opt-in), not blocking it. Unfortunately, for many, their first exposure to these companies (outside of an inbox full of enticing offers) has been via news around data breaches, first, in 2010 with Silverpop and now Epsilon.
In the previous installment of our series of IPv6 security posts, we covered some of the ways addressing has changed in IPv6 compared to IPv4. In this post, we’ll talk about some of the things to consider when securing IPv6 compared to IPv4. Before digging into this topic, however, it is important to remember that while IPv6 may have different security concerns than IPv4, it is not necessarily any more secure than IPv4. Furthermore, the post will focus on those aspects that are different or unique to IPv6, since many of the common best practices for IPv4 networks also apply to IPv6 networks.