Filter by Category

Preview of Gartner Security & Risk Management Summit 2017

Four days of security discussions, over seventy five speakers, and six program tracks; these are the numbers exciting cybersecurity professionals around the nation as they prepare to attend this year’s Gartner Security & Risk Management Summit. Taking place from June 12-15 in National Harbour, Maryland, this summit is one of the biggest and most important of the year.

Linoma Software [now HelpSystems], will be attending this premier gathering of security, risk management, and business continuity management leaders, in order to take in this all too valuable informational experience.

Here are some must-see sessions that we’re looking forward to:

What Can We Expect from the EU’s General Data Protection Regulation?

June 12, 2017 | 10:00 AM – 11:00 AM | Carsten Casper

Are you ready for GDPR compliance? Do you have a timeline in place to implement the required security protocol? The latest cybersecurity compliance regulation out of Europe has companies around the world wondering – does this apply to us? This session will go into full detail about the regulation, as well as what actions IT departments in non-European countries must take to meet compliance regulations.

Forcepoint: Insider Threats: Understanding Intent and Creating Actionable Programs

June 12, 2017 | 11:30 AM – 12:15 PM | Dr. Richard Ford, Meerah Rajavel

In a time where large and harmful security breaches seem to occur as often as the sun rises and sets, companies often struggle to hard to pinpoint where these breaches are coming from and why. A recent study from Crowd Research Partners showed that cybersecurity professionals consider “internal threats” the biggest threat to IT security. This session, presented by Joint Forcepoint Chief Scientist Dr. Richard Ford and CIO Meerah Rajavel, will examine strategies for implementing people-centric protection systems that will prevent bad cyber practices and enable good behaviors to help stop breaches caused by internal threats.

Roundtable: Managing Cloud Service Provider Security

June 12, 2017 | 2:00 PM – 3:00 PM | Jay Heiser

When it comes to the many cloud services that enterprises are confronted with, well, the sky’s the limit (pun intended). The cloud and its many benefits are more relevant than ever, and in this session, speaker Jay Heiser poses the question: who is accountable for managing this risk and ensuring that these cloud providers can be trusted? With such promising discussion, we strongly urge you not to miss this one.

To the Point: How to Respond to PCI DSS v.3.2

June 15, 2017 | 12:00 PM – 12:30 PM | Rajpreet Kaur

The 2018 deadline for compliance to PCI DSS v.3.2 is rapidly approaching. This session will cover information surrounding the various enhancements to the latest PCI DSS version and how to deal with them. Our recent whitepaper breaks down everything new about v.3.2, but we’re certainly interested in hearing what additional details and considerations Rajpreet discusses in this session.

We can’t wait to see you at the Gartner Security & Risk Management Summit of 2017! Make sure to come find us in booth 100 or reserve time at the event to chat.

Latest Posts


What is Secure File Sharing?

October 18, 2019

Secure File Transfers 101Secure is the operative word here. Dozens of applications allow you to transfer files – small to large – between different users or organizations. A secure file transfer…


Need a Cloud-Based MFT Environment? Try a Hybrid Cloud Setup

October 15, 2019

Cloud integration is growing in popularity, but committing 100% to the cloud isn’t always practical or secure for organizations. If you’re in the market for cloud-based solutions, read our quick…


10 Cybersecurity Tips and Best Practices

October 14, 2019

The 10 Best Cybersecurity Tips and Practices – as Told by IT Professionals Although there’s a lot of tips and best practices out there when it comes to cybersecurity, it’s important to make…


What are SFTP Servers?

October 11, 2019

What are SFTP Servers? A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive…


What Port Does SFTP Use?

October 10, 2019

Different Protocol, Different PortPorts, also known as channels, are an integral part of the successful delivery and communication process of secure files. Although the specific protocols that…