SC Magazine 20/20: Beyond the next generation hype: Strategic direction for network security

SC Magazine 20/20: Beyond the next generation hype: Strategic direction for network security
SC Magazine 20/20: Beyond the next generation hype: Strategic direction for network security

Click here to register

20/20 Webcast - Beyond the next generation hype: Strategic direction for network security

Date:
May 22, 2012
Time: 11:00 a.m. PT / 2:00 p.m. ET
Cost: Free

As networks grow more complex, the process of securing and managing endpoints, applications and confidential information has become a stiffer challenge than ever before. The attackers know most organizations are like Swiss cheese when it comes to finding a way in and then exporting out sensitive data. The traditional defenses aren't working to the degree that companies demand, so as security becomes more and more tied to business operations, corporations are finding that the best defense is a solid risk management plan that speaks to both asset protection and compliance.  But we all need help getting there. In this webcast, we'll ask the questions to which you want answers.

Featured Speakers:
Greg Brown, VP, network security, McAfee
Ilena Armstrong, VP, editorial director, SC Magazine

Click here to register

Sponsored by:

More in Editorial Webcasts

Counter malware threats and protect your business

Counter malware threats and protect your business

The cyber security threats with which information security pros must contend run the gamut from web-based malware to application vulnerabilities. Both traditional and ever-new methods are being used by cyber ...

APTs: The role of third-party apps

APTs: The role of third-party apps

Once an anomaly with which government agencies and some private companies that work with them had to deal, advanced persistent threats (APTs) are becoming a considerable problem for a spate ...

The new normal - APTs

The new normal - APTs

There's a saying in the security business these days: Either you've been compromised or you don't know you've been compromised. As advanced adversaries continually penetrate organizations of all sizes to ...