Endpoint Security Fundamentals: Part 2

Presented by

Mike Rothman, Securosis; Jeff Hughes, Lumension

About this talk

In today’s mobile, always on business environment, information is moving further away from the corporate boundaries to the endpoints. Cyber criminals have more opportunities than ever to gain unauthorized access to valuable data. Endpoints now store the crown jewels; including financial records, medical records, trade secrets, customer lists, classified information, etc. Such valuable data fuels the on-demand business environment, but also creates a dilemma for security professionals to determine the best way to protect it. This three part webcast series on Endpoint Security Fundamentals examines how to build a real-world, defense-in-depth security program – one that is sustainable and one the does not impede business productivity. Part 2 of this webcast series, Leveraging the Right Enforcement Controls, examines: • How to automate the update and patch management process across applications and operating systems to ensure all software is current • How to define and enforce standardized and secure endpoint configurations • How to effectively layer your defense and the evolving role that application whitelisting plays • How to implement USB device control and encryption technologies to protect data

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (50)
Subscribers (8004)
This channel provides live and on-demand webcasts on a range of Endpoint Management and Security topics, including: identifying the latest trends and best practices for minimizing insider risks, reducing your threat exposure, managing Web 2.0 threats, reducing your cost of compliance and taking control of your endpoints, from both an operational and security perspective.