How to Bring Security Best Practices to Life in Your Organization

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

In a world where cyber threats are a constant danger, companies find themselves in an ongoing battle to keep their data safe. A plethora of risks now exist as cyber-criminals continually seek new ways to breach our borders and get their hands on our vital information.

However, did you know that 99.9% of exploits are possible because organizations don't address basic security hygiene? The fact is that a lot of industries focus on the wrong things, often using security strategies that are fundamentally flawed and ultimately do not provide the right sort of protection they need.

There are, of course, a lot of best practices out there, but how do you bring those frameworks to life within your organization?

In this webinar, we will explore some of the main threats companies face and discuss the ways in which they can address the top five security controls with confidence to ensure a better overall security posture.

Find out how to:

  • Find unmanaged assets
  • Assess the amount of unauthorized software running in an environment
  • Secure endpoint configurations
  • Locate and address critical vulnerabilities
  • Control the use of administrative privileges.


Christian Arndt

Director at PwC

    Jennifer  Ellard

    Director, Product Marketing, Tanium

      Ken Robinson

      Director, Technical Account Management , Tanium

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.