How to Secure the Most Vital Data Channel in Your Organization: File Transfers

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Files are important, right? They move in, out and around your network all day long, transmitting personal data, order fulfilment, diagnostic data between people and automated systems – keeping the wheels of your organization turning.

However, how secure are these vital exchanges? According to Rapid7’s 2020 National/Industry/Cloud Exposure Report, often they are not, with over 13 million insecure FTP servers being accessible from the internet. The report even points out that government departments are particularly guilty in this respect.

In this webinar, a panel of experts will discuss how to secure vital file transfer channels and how important the security, integrity and availability of these workflows are to the greater operational functions of organizations.

Key Takeaways:

  • Learn how to secure file transfer workflows to ensure that data is both protected and transferred on-time, every time
  • Discover how a well-designed secure transfer solution can save your organization time and money

Speakers

James Coker

Reporter

    Professor Kevin  Curran

    Senior IEEE Member and Professor of Cybersecurity, Ulster University.

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.