Share

Speakers

Richard Garsthagen

Senior Evangelist, Products & Marketing, EMEA

Siân John CISM, CISSP, MBCS

Security Strategist, Symantec Corporation

Steve Gold

Technical Editor, Infosecurity Magazine

Webinars

Virtual machines vs real cybercriminals - is your v-security up to scratch?

Date: 28 June 2011, 14:00 BST
Duration: 1 hours

View recording

Large numbers of corporations are migrating their IT resources to a virtual machine environment - largely thanks to the cost savings and convenience that the leading edge technology offers. But the security strategies required for thus brave new virtual world are radically different to those most of us are experience in. 

Join us for an informative 60 minute webinar in which our panel of experts - including key Symantec and VMware security experts - will explain what security planning strategies and technology solutions can assist IT professionals tasked with moving their business IT systems over to a virtual platform.
 
Along the way you will learn about:
  • The security strategies needed to defend a virtual environment
  • The security solutions needed to defend your virtual platform
  • What existing security systems can be redeployed for virtual IT
  • What attack strategies cybercriminals are using against v-systems
  • How to raise your security game in an evolving virtual world  
This webinar is for: 
  • CSOs and CISOs looking for answers to virtualized security challenges
  • IT security professionals seeking answers to virtualized security questions
  • IT security managers wanting to understand the nature of v-security
  • IT professionals looking for the v-security strategies/solutions that matter
  • Anyone wanting to better understand the security challenges that virtualization creates for IT professionals and their managers

 CISSP SSCP logo

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

 

View recording

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×