Media Advisory – Webcast Today: A New Approach to Addressing Regulatory Compliance

Share Article

Third Brigade is sponsoring a webinar hosted today by Paul Reymann, CEO of ReymannGroup and co-author of Section 501 of the Gramm-Leach-Bliley Act Security rule.

Third Brigade (http://www.thirdbrigade.com ), a security software company specializing in host intrusion detection and prevention systems (IDS/IPS), is sponsoring a webinar hosted today by Paul Reymann, CEO of ReymannGroup and co-author of Section 501 of the Gramm-Leach-Bliley Act Security rule.

Who should attend: Compliance officers, IT/IS security professionals and media covering IT/IS security and the increasing regulatory compliance requirements driven by regulations and guidelines such as PCI, GLBA, SOX, HIPAA, SAS 70 and more.

Attend the webcast to learn:

  • How an organization can streamline its security compliance strategy, avoid duplication of effort and reduce cost
  • Key information security mandates and common compliance threads
  • The benefits of adopting the right technology infrastructure

When:

  •     Today, February 26, 2008 – 2:00 PM ET, 1:00 PM CT, 12:00 PM MT, 11:00 AM PT

Speaker:

  •     Paul Reymann, CEO, ReymannGroup

Register:

About the Speaker:
Mr. Reymann is one of the nation's leading financial institutions regulatory experts and co-author of Section 501 of the Gramm-Leach-Bliley Act Security rule. Fortune 500 companies have leveraged his subject matter expertise to develop successful go-to-market strategies for information security and technology products and services within key vertical markets. In addition, he is referenced frequently in industry news and has authored numerous articles and papers on technology risk and more.

About Third Brigade
Third Brigade (http://www.thirdbrigade.com) specializes in providing host intrusion defense systems to organizations that need to detect and prevent attacks that exploit vulnerabilities in mission critical systems. Third Brigade Deep Security allows businesses to apply comprehensive security profiles to hosts that protect against known and zero-day attacks using deep packet inspection. It helps ensure compliance and the 24-7 availability of critical systems, provides a virtual patch for software vulnerabilities, and allows organizations to deliver Internet-based services with greater security and confidence. Unlike other host intrusion detection and prevention systems, Third Brigade Deep Security provides broader, faster and simpler protection. Third Brigade. That’s control.

Note: “Third Brigade”, “Deep Security Solutions”, and the Third Brigade logo are trademarks of Third Brigade, Inc. and may be registered in certain jurisdictions. All other company and product names are trademarks or registered trademarks of their respective owners.

For more information:
Laura Maio
Media & Analyst Relations
Third Brigade, Inc.
(T) 613-599-4505 x2238
(M) 613-219-2800
laura.maio@thirdbrigade.com

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Laura Maio


613-219-2800
Visit website