Endpoint Security Fundamentals - Part 3 - Building the Endpoint Security Program

In today's mobile, always on business environment, as information moves further away from the corporate boundaries to the endpoints, cyber criminals have more opportunities than ever before to gain unauthorized access to valuable data. Endpoints now contain the crown jewels, including financial records, medical records, trade secrets, customer lists, classified information, etc. – which fuels the on-demand business environment, but also creates a dilemma for security professionals.

This is the third of a three part webcast series on Endpoint Security Fundamentals where we take the steps and enforcement controls discussed from Chapters 1 and 2 of the series and discuss how to meld them into a program. In Part Three of this series, Building the Endpoint Security Program, Mike Rothman, Analyst and President of Securosis, and Jeff Hughes, Director of Solution Marketing with Lumension, examine:

  • How to manage expectations and define success
  • How to effectively train your users about policies and how to ensure two-way communication to evolve policies as needed
  • How to effectively respond to incidents when they occur to minimize potential damage
  • How to document and report on your overall security and IT risk posture

Webcast Request:

*
Already registered? Click here to log in.
*
*
*Country/State
*
*
*
*
*