Hi [[ session.user.profile.firstName ]]

Understanding the End Point Governance Challenge

Securely governing the all your end points all of the time - and also proving compliance to the required audit and regulatory standards - has become a major IT security challenge, especially against an increasingly pro-active regulatory landscape.

Security automation is often mentioned as the ideal solution to this challenge - but where do you begin? And even if you have an automated system in place, the system itself still needs reviewing on a regular basis.

Technology may be a driver, but planning - as any IT professional will confirm - is everything.

This Webinar can help - in the space of 60 minutes we will help you understand:


How to harness the required technology and reporting tools to achieve compliance...

Why the compliance landscape is getting more complex - and what challenges this creates...

How automation software can generate its own cost efficiencies...

Why automated reporting will ease your network admin burden...


Along the way our panel of leading experts will explained how using automated security can assist you in achieving a higher level of confidence when it comes to the reliability and validity of your data.

You could spend time, money and resources learning the hard way - or you could invest a little of your time to learn how to spend those resources more efficiently, and so gain an understanding of why the audit and governance landscape is changing...
Recorded Jun 20 2013 81 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sean Pollonais, Security Analyst; Richard Hollis, Risk Factory; Peeush Bajpai, Kaseya
Presentation preview: Understanding the End Point Governance Challenge
  • Channel
  • Channel profile
  • Understanding the real cost of data breaches Recorded: Nov 21 2013 71 mins
    Pfr. John Walker, Nottingham Trent Uni.; Robert Bond, Speechly Bircham LLP; Mick Paddington, Trend Micro
    In October the European Parliament voted on the new Data Protection Directive - with approval for fines to be raised from 2pc to 5pc of global turnover...

    Put simply - if you suffer a data breach, and it's down to you or your staff's negligence, not only will your brand reputation suffer, but your annual profits could disappear in financial penalties. And that is before we factor in legal action from clients and customers...

    Do we have your attention yet?

    Are you worried?

    You are not alone!

    This Webinar can help - our panel of legal and commercial specialists will explain the challenges that lie ahead for UK PLC on the data protection front - and the strategy and solutions needed to robustly counter the tightened legislative landscape - and still come up smelling of roses...

    Join IT Security Pro for what promises to be a ground-breaking and thought-provoking set of presentations - as well a panel-led Q&A session in which you will have the chance the questions that matter to you - and your business - to our team.

    Can you afford not to attend this 60-minute event?

    Or do you really want to risk your annual profits?

    Please register here...
  • Windows XP: End of Life - are YOU ready? Recorded: Oct 10 2013 73 mins
    Clive Longbottom, Quocirca; Shane Columbo, affini; Peeush Bajpai, Kaseya
    April 8, 2014 is a red-letter day in the IT industry - it's then that Windows XP support ceases.

    And are the cybercriminals aware of this? They most certainly are - and reports suggest they are `saving' some of their most intense attack vectors up for next spring.

    So what are you doing about this? Do you have a Windows XP migration master plan in place?

    This Webinar can help. Our panel of experts will explain:

    How to plan - and undertake - an effective risk analysis process and ascertain exposure within your IT estate...

    How to analyse your organisation readiness for migration from WinXP

    What their organisation is doing to meet this challenge...

    How to plan for the worst - and rise above the challenges...

    Why effective migration strategy and planning can avoid a fire-fighting scenario...

    How to undertake en-mass WinXP upgrade in your IT-estate - without disrupting the business and users...


    We'll also have a live and interactive Q&A/panel discussion during which YOU will get the change to pose YOUR questions directly to our panel of experts...

    Please register for one of the key Webinars of 2013...
  • Enterprise File Sharing: Protecting Your Digital Assets Recorded: Sep 17 2013 77 mins
    Prof. John Walker, Ascot Barclay; Neil Hare-Brown, Blackthorn: Dave Butcher, Axway
    Enterprise File Sharing: Protecting Your Digital Assets


    One of the biggest challenges facing modern security professionals is the issue of secure file sharing, especially against the backdrop of attractive and free - yet highly insecure - consumer-grade file-sharing services available on the Web.

    Moving data outside of the company's direct control, no matter how cost-effective it might initially appear, is a definite no-no - especially data that must abide by the plethora of regulatory and best practice rules such as Basel III, the Companies Act, PCI DSS, Sarbanes-Oxley et al.

    The solution to these challenges is a highly secure business data sharing service that meets - and exceeds - the demands of these regulations, and also allows embedded policy controls.

    This Webinar can help - our panel of experts will look at the key challenges, and solutions to those challenges. Along the way, you'll hear about:


    How to create an effective data governance strategy...

    The need to encrypt data in transit - and at rest - to ensure full security and file fidelity...

    Security services such as an embedded policy engine to the need for full content inspection and policy enforcement...

    How `plug and play' can be a reality - even in a highly controlled file-sharing schema...

    The growing requirement to integrate with Active Directory/LDAP technologies...


    Register today for a unique opportunity to better understand this key security issue.
  • Virtualisation Security under the microscope Recorded: Jun 25 2013 65 mins
    Rob Bamforth, Quocirca; Brian Shorten, CSF; Giovanni Alberici, Trend Micro EMEA
    Virtualisation has come a very long way in a very short space of time - and is even starting to enter the IT consciousness as a concept, in much the same way as Google has entered the general population's vocabulary...

    But virtualisation brings with it new challenges, not in the least when it comes to IT security. Can you be completely confident that your virtual infrastructure is secure?

    A new study into virtualisation practices across organisations in the UK has revealed that many companies are struggling to secure ever more complex IT infrastructures and that:

    Virtualisation is a major contributor to increased complexity...

    The majority of organisations felt the need to update their security model because of virtualisation...

    Two thirds have experienced a data breach - and only half were discovered by security tools...

    Almost all organisations are concerned that they will be victim to a security breach in the future...

    There is a worrying disconnect between those responsible for IT security and the data centre...


    Join us for an informative and entertaining Webinar when you will hear the full results of the study - and learn how best practice is the best way forward in ensuring that your organisation avoids the same pitfalls.
  • Understanding the End Point Governance Challenge Recorded: Jun 20 2013 81 mins
    Sean Pollonais, Security Analyst; Richard Hollis, Risk Factory; Peeush Bajpai, Kaseya
    Securely governing the all your end points all of the time - and also proving compliance to the required audit and regulatory standards - has become a major IT security challenge, especially against an increasingly pro-active regulatory landscape.

    Security automation is often mentioned as the ideal solution to this challenge - but where do you begin? And even if you have an automated system in place, the system itself still needs reviewing on a regular basis.

    Technology may be a driver, but planning - as any IT professional will confirm - is everything.

    This Webinar can help - in the space of 60 minutes we will help you understand:


    How to harness the required technology and reporting tools to achieve compliance...

    Why the compliance landscape is getting more complex - and what challenges this creates...

    How automation software can generate its own cost efficiencies...

    Why automated reporting will ease your network admin burden...


    Along the way our panel of leading experts will explained how using automated security can assist you in achieving a higher level of confidence when it comes to the reliability and validity of your data.

    You could spend time, money and resources learning the hard way - or you could invest a little of your time to learn how to spend those resources more efficiently, and so gain an understanding of why the audit and governance landscape is changing...
  • Big Data: intelligence on tap - but who is tapping in? Recorded: Jun 6 2013 75 mins
    David Turner, CTO CANDDi; Damien O'Dwyer, Business Growth; George Anderson, Webroot
    Big Data has become a key topic in a growing number of boardrooms - thanks to the fact that growing number of businesses are tapping into the almost-free marketing and allied information resources that your organisation's archival data offers.

    But along with the use of Big Data - which most companies produce, even if they are unaware of its power - comes the headache of securing that same data from prying eyes, as well as ensuring that only the correct people have access to the data they need.

    Just to make life interesting, some organisations are even storing their Big Data in the cloud.


    You need a primer to tell you:

    Where to start when tackling the governance challenge that Big Data presents...

    What Big Data is, what it can do, and how it fits into your IT framework...

    Detail the security and network analysis strategies you need to defend your Big Data...

    Educate you on the security challenges - and pitfalls - other organisations have experienced...

    Help you understand where to start when tackling the governance challenge that Big Data presents...


    This Webinar can help - ITSP and Webroot have assembled a panel of experts to answer these - and other key questions - which today's IT professionals are asking.
  • Raising your security bar: why automation of critical controls is so essential Recorded: May 30 2013 79 mins
    Sean Pollonais, Security Analyst; Peter Wood, First Base; Wolfgang Kandek, CTO Qualys
    Ensuring the confidentiality, integrity and availability of IT assets is now a central feature of effective security management, but - like many business requirements - it is usually easier said than done... This Webinar can help.

    In the space of 60 minutes we will give attendees a primer on the strategy needed to better your critical security controls.

    Along the way we will:

    Explain why automation is central to your critical security controls...
    Help you develop the required inventory and security configuration process...
    Assist you in planning the rigorous security automation your business needs...
    Educate you on the need for measured security risk...
    Detail the data recovery, pen testing and red team exercises required...

    This Webinar is for:

    C level security professionals wanting to raise their game...
    Audit and governance managers looking at automated risk analysis processes...
    Security professionals seeking to better their governance strategies...
    Any IT professional seeking a primer on automated critical controls...
  • It's a cyberheist - against your business! Recorded: May 22 2013 83 mins
    Bob Tarzey, Quocirca; Rik Ferguson, Trend Micro; James Walker, Trend Micro
    Through the use of carefully planned and orchestrated targeted attacks, today's threat actors are seeking to monetise THEIR frauds with YOUR business data. It is clear that the dark science of cybercrime has become a danger for any business that does not have a proactive strategy in place, one specifically designed to protect against this new wave of sophisticated cyberheists.

    Countering these attacks - from cybercriminals, industrial espionage professionals and plain old fraudsters - is an imperative that can become crucial for the very future of your business.


    How do you defend yourself?

    This Webinar will assist you by...

    Explaining the nature and motivation behind the latest targeted attacks...

    Helping you understand the methodology employed by this new generation of threat actors...

    Assisting you in developing an effective strategy to counter the latest attack vectors...

    Allowing you to refine your security defence posture, both now and in the future...


    Targeted attacks are here to stay - make sure you're prepared
  • The evolution of cybercrime Recorded: May 8 2013 69 mins
    Peter Wood, CEO FIrst Base; Rolf von Roessing, ISACA; Grayson Milbourne, Webroot
    Cybercrime has come a long way in just a few decades - and along the way, has become a business, and a business that focused is monetising fraud against your organisation's data in all its various shapes and forms...

    And along with this evolution has come the arrival of hybrid and multi-vectored threat actors such as AETs and APTs - and IT professionals are sat in the middle of a constantly changing IT landscape, constantly looking for new approaches to defend the company gunnels against cybercriminals.

    This Webinar will give attendees a rundown on how the cybercrime landscape has changed over the last 25-years, as well as detailing the latest threats - and threat actors - that cause a growing number of IT security professionals more than a little angst.

    We'll also be looking at the latest strategies - and methodologies - with which you can better defend your organisation's IT and data resources.

    This online event will:


    Brief you on the latest cybercrime trends...

    Help you understand how the financial imperatives of cybercrime...

    Educate you on how to think like a cybercriminal - and work backwards to develop a more effective defensive strategy...

    Explain how effective data security is a state of mind...

    Assist you in getting more bang for your buck from security technology...
  • Meeting the Challenge of Advanced Persistent Threats Recorded: Apr 16 2013 77 mins
    Tim Langley, CANDDi; Peter Wood, First Base Tech; Adrian Barrett, Exonar
    Cyber attacks sponsored by Nation States are on the rise. They have more executive visibility than any other security topic. With Big Data becoming a reality in modern businesses, - how do data security professionals meet the new challenge of defending ever growing volumes of information from the onslaught of advanced persistent attacks (APTs)?

    Join us for an interesting and thought-provoking Webinar in which we'll explore how Nation States steal information, what Big Data is, what challenges it creates for management and how it changes the business and IT data ballgame.

    Along the way you will...

    Understand how an APT attack avoids existing security
    Learn what Big Data is - and is not...
    Hear about the challenges Big Data creates for business and IT professionals alike...
    Develop a robust Big Data and APT defence strategy...
    Learn how to better defend the new data silos that Big Data creates...
  • Securely Managing the Changing Endpoint Recorded: Apr 11 2013 67 mins
    Prof. John Walker, Glass Ceiling Research; Vincent Bourne, Global Radio; Tim Williams, Absolute Software
    How Portable Devices are Changing the Governance Landscape

    laptops, tablets and smartphones are changing how employees interact and consume data - and are also changing the governance landscape. The secure management of these devices is a must have in order to navigate this ever evolving landscape.

    Welcome to the real reality of mobility: the convergence of governance, management and security of portable devices.

    Join us for this informative Webinar in which we learn how Global Radio securely manages the more than 1,800 MacBooks, iPads and iPhones in its deployment - and how it combines the tasks of device management and governance in order to optimise operational efficiencies.

    Along the way you'll learn about the Absolute Software technology that drives this customer deployment, as well as hear from a leading independent security consultant on portable device security and management in the real world.


    This Webinar will:


    Look at a real-world portable life cycle management system in a large multi-site company...

    Help you understand why governance is a key element of ensuring security...

    Explain how iPads and iPhones can be effectively deployed on a manage-your-own basis...

    Educate you on the challenges that portable devices create for the IT department...

    Assist you in making your own choices when it comes to portable system governance...
  • New attack vectors demand new attack defences Recorded: Mar 21 2013 79 mins
    Bob Tarzey, Quocirca; Peter Wood, First Base; & Tom Davison, Check Point
    "Just as water retains no constant shape, so in warfare there are no constant conditions."


    Hacker techniques are constantly changing, using more advanced and sophisticated attack methods, raising the security challenge to new levels.

    How do you defend against this security New World Order?


    This Webinar can help...

    Our panel of experienced IT security veterans will explain some of the strategies, techniques and technologies available to the modern infosecurity manager as s/he seeks to stay one step ahead of the threat landscape and all the problems it creates.


    Along the way you'll learn about...


    Tapping the power of technology to automate your defences...

    The need for multi-layered security protection...

    Why security strategies are based on careful planning - not fire fighting...

    How technology alone is never going to be enough..

    Policy and enforcement systems - and why they are essential...
  • The past/future history of malware -- and the advancement of threats Recorded: Feb 28 2013 74 mins
    Prof. John Walker, Nottingham-Trent Uni; Jonathan Bathurst, CyberSecurity Challenge; George Anderson, Webroot
    The humble virus - aka malware - has come a long way since the Morris worm started the darkware bandwagon rolling in late 1998. As the information security industry moves towards the 25th anniversary of the first worm, the BIG question on every security professional's lips is: what is coming down the malware turnpike next?

    Join us for an entertaining and enlightening Webinar in which our panel of experts will look at the history of malware, what lessons history teaches us, and what attack vectors cybercriminals are likely to use in the future as they seek to monetise their frauds, and gain a vision of what the next generation of advanced threats may look like.


    This webinar will help you...


    Understand how cybercriminal strategies are evolving...

    Learn why the endpoint is a key target for cybercriminals...

    Develop an understanding of AET/APT attack vectors...

    Refine your Internet and Web security strategies...

    Learn how to better defend your organisation's IT resources...

    Understand the limitations of the current day conventional approach to delivering cyber defence...
  • Resolving IT-GRC control challenges in the frenetic enterprise Recorded: Feb 19 2013 74 mins
    David King, OMG; Ritesh Patel, BP Intl; & Scott Gordon, ForeScout Technologies
    Security and governance are not natural bedfellows - but they need to be drawn together to achieve best practice standards, and, of course, regulatory compliance.

    The reality is that modern network, device, user, application and access dynamics are challenge for any IT security professional.

    You've probably built-out process and controls to address these issues - you also invested heavily in network and host-based security, systems management, SIEM and other security mechanisms. But the reality is that new threats and state changes will cause you security headaches.

    This Webinar can help you...

    During this 60-minute expert session, you'll:

    Learn where Network Access Control (NAC) sits in the enterprise security mix...

    Understand how NAC can help you close real-time security and compliance gaps - and automate IT responses...

    Gain an insight into common IT Governance Risk & Compliance (GRC) assumptions and exposures...

    Develop a strategy to reduce access and endpoint integrity exposures...

    Learn about real-world NAC implementations...
  • Understanding effective PCI-DSS compliance Recorded: Feb 14 2013 78 mins
    Todd Thiemann, Vormetric; Rob Bamforth, Quocirca & Peter Wood, First Base Technologies
    Any company that stores, processes or transmits debit or credit card data must comply with the Payment Card Industry Data Security Standard (PCI-DSS) - and with v3 of the data governance rules soon to be released, it is clear that enterprises will have to sharpen their act in order to maintain compliance.

    Compliance for new entrants to the PCI-DSS governance audit process is far from easy - and the regulations are going to get tougher for existing enterprises when PCI-DSS 3.0 comes the regulatory turnpike.

    This Webinar can help - we'll advise you on the key areas that you can address, as well as explain some of the pitfalls that can happen.

    This online event will help you...

    Understand PCI-DSS Requirement 3 - Protect stored cardholder data...

    Meet the needs of Requirement 7 - Restrict access to cardholder data by business on a need to know basis...

    Deploy systems for Requirement 10 - Track and monitor all access to network resources and cardholder data...


    Along the way you'll learn about...


    Enterprise PCI-DSS requirements and audits...

    How strong encryption is the key to success...

    Why native encryption is not the best option...
  • Is your Web security agile enough for today's Internet? Recorded: Jan 31 2013 66 mins
    Dominic Roberts, Network Revolution, Ryan Dewhurst, RandomStorm & George Anderson, Webroot
    The Web - and the way employees use it - is changing.

    Static 2D Web browser usage is being replaced by dynamic and multi-dimensional pages, all driven by extensible code.

    Extensible code can take many forms - ActiveX, HTML5, Java, you name it - but most Web security platforms cannot defend your data from what has become a multi-threaded and complex programming environment.

    Whilst your users are enjoying a rich multimedia Internet, a new range of security threats can fly in under the wire.

    This Webinar will brief you on the nature of these threats and what you - and your hosting provider - can do to prevent any problems.

    Along the way you will learn:


    What threats extensible code poses your IT platform...

    Which strategies are required to counter these threats...

    The challenges that IPv6 adds to the communications/security mix...

    How a client/cloud architecture can provide a different approach to preventing viruses and malware...

    Why cloud-based secure Web gateway technology is the intelligent way forward...

    The challenges that extensible code poses to WordPress and other corporate blogs...
  • IT consolidation - is your security up to the task? Recorded: Dec 11 2012 75 mins
    Rob Bamforth, Quocirca; Prof. John Walker, Nottingham-Trent University & John Rowzee, Check Point
    The business side of mergers and acquisitions (M&A) can be gruelling - countless meetings between executives, lawyers, and bankers - plus a mountain of paperwork and red tape soaking your team's time like blotting paper...


    Integrating the IT is usually a planned process, but what about the security systems - security and governance vendors may claim the process is easy, but is it easy in practice? And how secure is your data really?

    Join for us for a thought-provoking governance Webinar in which our team of experienced professionals will discuss:


    Can you be truly protected in a multi-vendor IT environment?

    Does multiple management across multiple products from multiple vendors really take time and effort to resolve?

    Is it better to aggregate or consolidate systems?

    Can all security platforms scale up (and down) as the vendors claim?

    Which organisations can assist you in consolidation process?
  • Web security in 2013 and beyond: planning for the future Recorded: Dec 6 2012 68 mins
    Jay Abbott, Cyber Security Challenge; Bob Tarzey, Quocirca; Iain Keir, Check Point
    The Web - the graphical version of the Internet we now consume on a variety of business devices - has changed immeasurably in the last five years.

    And it will change immeasurably in the next five years.

    But is your network security up to the task?

    Protecting network users today requires a different set of tools and technologies than it did five years ago.

    The task not simply about blocking an inappropriate URL - or stopping a high-risk application from running on an end-point - it takes an integrated security topology and set of resources that:

    Control applications...
    Defend against drive-by downloads...
    Prevent bots from acting...
    Remediate malware...
    Stop malicious links...

    Join us for a 60-minute Webinar in which we will help you:

    Assist you in leveraging firewalls to increase network visibility...
    Develop new strategies to improve network security posture...
    Protect all manner of devices on the company network...
    Understand the new requirements for network user protection...
  • Smartphones, tablets and the need for security exigency Recorded: Nov 28 2012 75 mins
    Sarb Sembhi, Incoming Thought; Peter Wood, First Base; George Anderson, Webroot
    Smartphones and tablet computers are both pervasive and ubiquitous - they are also intrinsically unsafe data communication devices, especially if their owner jailbreaks, roots or similarly unlocks them.

    But how do you secure their usage - both at home, in the field and in the workplace?

    We won't bore you with BYOD security mantras in this Webinar.

    We will tell you, however, about how to raise your personal and business security bar when using smart portable devices: where the danger hot spots lie, and how those dangers can be remediated.


    Along the way you'll learn about:


    Smudging attacks

    Data exfiltration - easy to do, tricky to stop

    The smartphone - the ultimate industrial espionage device?

    Why sleeping mobile malware is so dangerous

    Deploying mobile security technology on a budget

    Evil twin attacks - and how to stop them
  • Planning for a DDoS attack: Are YOU ready? Recorded: Sep 18 2012 68 mins
    DanJoe Barry, Napatech; Sarb Sembhi, Incoming Thought; Randeep Gill, Check Point
    -- and why good remediation technology should be central to your plans...

    DDoS attacks have gone from being a minor headache to a potentially catastrophic attack vector in the space of a couple of years - largely thanks to the rise of hacktivist attacks - but what can you do to turn these security mountains into the molehills they once were?

    This webinar will explain your options.

    You will learn:

    How to plan to assuage a DDoS attack's effects...

    Why planning - and Internet path redundancy - can save your bacon...

    What the Internet mandarins are doing to help major clients...

    Cloud or bricks and mortar data centres - or both - which is best?...

    What security options are available to your business?...

    The key technologies to deploy at the sharp end of the Internet...

    Why there is no silver bullet solution - just careful strategy and planning...
In depth information from IT Security thought leaders
Live audio webcasts moderated by the editor in chief of IT Security Pro, Steve Gold. Bringing you information on a range of relevant IT topics

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Understanding the End Point Governance Challenge
  • Live at: Jun 20 2013 2:00 pm
  • Presented by: Sean Pollonais, Security Analyst; Richard Hollis, Risk Factory; Peeush Bajpai, Kaseya
  • From:
Your email has been sent.
or close