All
NORCONS
direct connect
Events
Transcripts
Poll Results
Not a Member? Learn More
 

The following documents, direct connect discussions, and events meet your search criteria. The resources are sorted under the tabs below. You may download documents now or save them to your My Library for future reference. To add to the discussion or post a question relating to your search on direct connect, a Username is required and can be quickly set in your Individual Profile.

Your Information Team is eager to help. Click here for more assistance.

Search Results
Showing 1 - 10 of 12 Results
BlankPrev Page 1
Document Pages Document
Number
File Type Blank Document Type
Blank
Date PostedBlank Get
Documents

MANAGING SHADOW IT

NOREX members share advice on identifying and dealing with Shadow IT during this September 2017 session.

10 NV2189 Blank Transcript 09/2017 Add to My Library
Download

PCI REQUIREMENTS KEY.

Payment Card Industry (PCI) requirements regarding security, development, and firewall/router configurations are outlined in this key.

19 20-281 Blank NORCON 09/2017 Add to My Library
Download

CYBER SECURITY

NOREX members discuss cyber security best practices and share recommendations on security tools for endpoint protection, threat detection, etc. during this August 2017 session.

18 NV2183 Blank Transcript 08/2017 Add to My Library
Download

NEXT GENERATION SECURITY TOOLS

NOREX members discuss the evaluation and implementation of behavioral-based security tools during this April 2017 session.

22 NV2160 Blank Transcript 04/2017 Add to My Library
Download

ENDPOINT SECURITY/PROTECTION

NOREX members discuss procedures and products used to protect endpoint devices during this February 2017 session.

36 NV2152 Blank Transcript 02/2017
Download

DDoS MITIGATION PLAN.

A Distributed Denial of Service (DDoS) attack can be a website shutdown to interrupt a business, holding a business hostage while demanding payment to release the website, or overloading a firewall so the actor(s) can try penetrating the firewall & implanting malware or a backdoor into the victim's network.

7 20-099 Blank NORCON 01/2017 Add to My Library
Download

LESSONS LEARNED MOVING TO THE CLOUD

NOREX members share their experiences with cloud computing and their future cloud plans during this January 2017 session.

28 NV2147 Blank Transcript 01/2017
Download

IT SECURITY TOOLS

NOREX members share recommendations for tools providing the effective detection and prevention of IT security threats during this July 2016 session.

32 NV2118 Blank Transcript 07/2016 Add to My Library
Download

SERVER & NETWORK DEVICE SECURITY POLICY.

This policy established for the base configuration of internal server and network appliance (router, switch, firewall, etc.) equipment.

3 10-1694 Blank NORCON 09/2014 Add to My Library
Download

FIREWALL RULE POLICY.

The goal of the firewall rule policy is to ensure that only allowed connections are maintained.

1 10-1640 Blank NORCON 06/2014 Add to My Library
Download