E is for Endpoint II: How to Implement the Vital Layers on Your Endpoints

Presented by

Paul Henry, Security & Forensics Analyst; Eric Ogren, Founder/Principal Analyst, Ogren Group; Doug Walls, CTO, EM Solutions

About this talk

IT security professionals rank third-party application vulnerabilities as the greatest security risk of 2012. And yet malware continues to exploit these – and other – vulnerabilities to breach our defenses. Clearly there’s a disconnect between knowing the problem and solving it. Yet it does not have to be this way, if we intelligently apply adequate protections against the exploitation of these vulnerabilities. Join this webcast, led by expert IT security panelists, to learn: •What are the vital layers of your endpoint defense. •How to thwart exploitation of your endpoint OS, configuration and 3rd-party application vulnerabilities. •How to prevent unknown applications from executing on your systems.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (50)
Subscribers (8004)
This channel provides live and on-demand webcasts on a range of Endpoint Management and Security topics, including: identifying the latest trends and best practices for minimizing insider risks, reducing your threat exposure, managing Web 2.0 threats, reducing your cost of compliance and taking control of your endpoints, from both an operational and security perspective.