Open Access

Discover the latest collection of talks and videos on Open Access from industry experts.

Attend Summits on Open Access

Web 2.0 Security

Web 2.0 Security

Web 2.0 tools boost information sharing and collaboration in a seamless way, leading to increased efficiency and convenience. Despite the benefits of web
2.0, data is more transient than ever. This open and connected cloud-based environment makes it difficult to know where data is located and who has acce…

|8 sessions
Mobile Security

Mobile Security

Consumerization of IT is an unstoppable process which, for most of the businesses, means greater productivity, quicker response to market fluctuations and
truly flexible workforce. In practice, it also means a growing number of mobile devices accessing confidential information via internal (managed) and exter…

|15 sessions
Mobile Security

Mobile Security

Consumerization of IT is an unstoppable process which, for most of the businesses, means greater productivity, quicker response to market fluctuations and
truly flexible workforce. In practice, it also means a growing number of mobile devices accessing confidential information via internal (managed) and exter…

|14 sessions