Cyber Security video series

loading-player

Playback of this video is not currently available

Is the cloud safe?

This section will provide viewers with an overview of many of the security, risk and governance aspects of moving to the cloud. Our panel of cyber and security professionals discuss what organizations should consider before moving data, applications or business proceeded to the cloud, steps they may take to better secure their data and how to begin to be prepared for an incident.

The challenge of mobility

Employee and consumer use of mobile devices has skyrocketed, creating novel threats to information security. Businesses that understand and are prepared for the risks and the opportunities can enhance productivity and gain competitive advantage. Our panel of cyber and security professionals discuss the risks and opportunities associated with accessing corporate data or enabling business processes from mobile devices. They also provide guidance regarding the need for education for end-users and how to effectively embrace the mobile change.

loading-player

Playback of this video is not currently available

loading-player

Playback of this video is not currently available

Payment cards and security

PCI is generally perceived as a complex security standard of extensive lists of security control requirements, various validation and reporting mechanisms, and merchant classification categories. Our panel of cyber and security professionals discuss the controls that should be in place around the data, key compliance considerations and aspects of responding to a breach.

Featured insights

Security for the evolved ecosystem

Security for the evolved ecosystem

This video features PwC partners David Burg, Michael Compton, and Adam Gutstein, sharing their experiences on moving security beyond four walls and into the extended ecosystem. Businesses are more interconnected, integrated, and interdependent—creating dynamic and evolving business ecosystems. Trusted business relationships and interactions with customers, service providers, suppliers, partners, and employees rely on securely sharing information assets and critical data.

Contact us

Kate Glenn
Forensics Marketing Leader
Tel: +1 (202) 312-742
Email

Follow us