IT Cyber Defense – Progress and Denial

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

A recent IDG global survey of over 1500 IT security professional sheds light on the state of cyber defense maturity.  

In addition to affording new incident and violation trends across industry and region, the results yield insight into IT security management capabilities, deficiencies and planned investment.  What is your company experiencing, and where does your organization fit on the IT cyber defense maturity spectrum compared to your peers?  
Lead by IDG and sponsored by ForeScout, join this webcast as we reveal the survey findings, discuss the issues and applied technologies, examine anticipated improvements, and give recommendations.  Attendees will:
Learn key security incident and violation trends
Appreciate perceptions of IT security management capacity
Uncover IT security management weaknesses and investments 
Explore visibility and control technologies, and those ripe for
Gain insight into regional and industry differences
Receive the Cyber Defense Maturity report 


Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Photo of Martin Courtney

Martin Courtney

IT Editor and Journalist

Photo of Scott Gordon

Scott Gordon

InfoSec Evangelist, Pulse Secure

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.