Endpoint Security Fundamentals: Part 3

Presented by

Mike Rothman, Securosis; Jeff Hughes, Lumension

About this talk

In today’s mobile, always on business environment, information is moving further away from the corporate boundaries to the endpoints. Cyber criminals have more opportunities than ever to gain unauthorized access to valuable data. Endpoints now store the crown jewels; including financial records, medical records, trade secrets, customer lists, classified information, etc. Such valuable data fuels the on-demand business environment, but also creates a dilemma for security professionals to determine the best way to protect it. This three part webcast series on Endpoint Security Fundamentals examines how to build a real-world, defense-in-depth security program – one that is sustainable and one the does not impede business productivity. In this final webcast of our series, Building the Endpoint Security Program, we take the steps and enforcement controls discussed from webcasts 1 and 2 and discuss: • How to manage expectations and define success • How to effectively train your users about policies and how to ensure two-way communication to evolve policies as needed • How to effectively respond to incidents when they occur to minimize potential damage • How to document and report on your overall security and IT risk posture

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (50)
Subscribers (8004)
This channel provides live and on-demand webcasts on a range of Endpoint Management and Security topics, including: identifying the latest trends and best practices for minimizing insider risks, reducing your threat exposure, managing Web 2.0 threats, reducing your cost of compliance and taking control of your endpoints, from both an operational and security perspective.