Forrester Analyst, Chenxi Wang, Ph.D. and ESET's Research team
How can IT security adapt to fight constantly mutating cyber threats?
As the adversarial relationship between information security professionals and malicious cyberactors intensifies, the security gap between new attack methods and traditional controls will grow in favor of the attackers.
Cyberattacks have become multidimensional in their complexity and sophistication.
Join Forrester Analyst, Chenxi Wang, Ph.D. to:
- Look at the new threats that corporate IT will face in 2012
- Discuss the role of IT in the face of such threats
- Review effective investment and risk management strategies to get ahead of the cyberattacks
- Explore strategies to invest in preventative technologies, not just on reactive controls
More specifically, we will dive into strategies to build a solid layered defense, not just patch-work products. For example, going from firewalls and IDS to log management, building DLP capabilities in your network, and investing in strong host-based controls would help you raise the bar significantly and give you advanced capabilities to identify malicious behaviors before they wreak havoc.
Panel Discussion Points with Forrester and ESET's Research team:
- What sort of new threats (or increase of existing threats) can be expected in 2012?
- What role does the commoditization of IT have, if any, in those threats?
- What role does the social media have, if any, in those threats?
- What can IT departments do to reduce their threat surface profile?
Followed by Q&A session