Endpoint Security Fundamentals - Part 1 - Finding and Fixing the Leaky Buckets

In today's mobile, always on business environment, as information moves further away from the corporate boundaries to the endpoints, cyber criminals have more opportunities than ever before to gain unauthorized access to valuable data. Endpoints now contain the crown jewels, including financial records, medical records, trade secrets, customer lists, classified information, etc. – which fuels the on-demand business environment, but also creates a dilemma for security professionals.

This is the first of a three part webcast series on Endpoint Security Fundamentals where we will examine how to build a real-world defense-in-depth security program - one that is sustainable and one that does not impede business productivity. In Part One of this series, Finding and Fixing the Leaky Buckets, Mike Rothman, Analyst and President of Securosis, and Jeff Hughes, Director of Solution Marketing with Lumension, examine:

  • The fundamental steps you should take before implementing security enforcement solutions
  • How to effectively prioritize your IT risks, so that you are focusing on what matters most
  • How to act on the information that you gather through your assessment and prioritization efforts
  • How to get some "quick wins" and effectively communicate with your senior management

Webcast Request:

*
Already registered? Click here to log in.
*
*
*Country/State
*
*
*
*
*