Wide Open: How Firms Are Failing To Protect Their Digital 'Crown Jewels'

Logo
Presented by

Moderator: Brandon Dunlap, (ISC)², Speakers: Martin Veitch, IDG Connect, David Higgins, CyberArk

About this talk

Organisations today rely on their business-critical applications and literally cannot function without these systems. They are the heartbeats and nerve centres of the modern enterprise, the fulcrums on which supply chains, operations, accounting, HR, payroll and e-commerce depend. No wonder then that these tools and the data they generate are also being targeted by attackers keen to bring their targets to a standstill. But most of time companies are failing to protect these ‘crown jewels’ assets and they rely instead on a paradigm from the last century: focusing on perimeter security and generic defences that don’t prioritise or protect the most important tools and services. Tune in to this webcast to hear about exclusive new research data on the state of modern security defences and get expert advice on how to protect your most important systems.
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (392)
Subscribers (93595)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs