Hi [[ session.user.profile.firstName ]]

How to Approach a Cyber Security Review with Your Eyes Wide Open

Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.

Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:

• Security KPIs with risky validation processes (far more common than you think)

• A checklist of security points that need tight inspection (and where to drill down)

• New security services that streamline the process
Recorded Dec 19 2017 15 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matthew Rogers, Security Director at Freudenberg IT
Presentation preview: How to Approach a Cyber Security Review with Your Eyes Wide Open

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Approach a Cyber Security Review with Your Eyes Wide Open Recorded: Dec 19 2017 15 mins
    Matthew Rogers, Security Director at Freudenberg IT
    Cybersecurity disasters dominated the news in 2017. WannaCry alone bashed hundreds of thousands of targets. Now is the time for CIOs and CSOs to scrutinize multiple components of their security because, let’s face it, attackers are busy working up new creative ways to hijack your data in 2018.

    Attend this webinar to learn what it takes to build an in-depth defense. This straightforward presentation will cover:

    • Security KPIs with risky validation processes (far more common than you think)

    • A checklist of security points that need tight inspection (and where to drill down)

    • New security services that streamline the process
  • Busted! 5 Myths About Cloud Technology Debunked Recorded: Dec 5 2017 56 mins
    Kevin Diaz, Chief Customer Officer, Freudenberg IT; Adam Page, Market Research Analyst, ASUG
    Have you ever had something that you knew in your heart to be true turn out not to be? The line between truth and myth has gotten blurry in the cloud space recently, but there are just some things prospective cloud customers shouldn't be worried about.

    Join mythbusters Kevin Diaz of Freudenberg IT and Adam Page of ASUG as they use findings from a recent member survey to break down and bust myths about the cloud. You may come out with a whole new outlook on your own data migration.
    View this on-demand webinar to learn:
    · How does traditional TCO calculation fit into the bigger picture? And where doesn't it fit?
    · Which systems are most likely to see an increase in migration in 2018?
    · Which challenges are a fact for seasoned cloud users, and which ones are fiction?
IT Solutions. Simplified.
Freudenberg IT (FIT) is a global leader in Managed IT Services steeped in SAP expertise. The way we see it, technology should make your life easier, not harder. This includes the complex IT that runs your company. Our goal is to help you squeeze the most value out of this vital technology so you can enjoy more business benefits, more easily. And experience less stress—in and out of the office. Simplifying IT is a tough job; we’re the somebodies who do it.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Approach a Cyber Security Review with Your Eyes Wide Open
  • Live at: Dec 19 2017 4:00 pm
  • Presented by: Matthew Rogers, Security Director at Freudenberg IT
  • From:
Your email has been sent.
or close