Can You be Secure by Design, Compliant and Enable Optimum Functionality?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The concept of being ‘secure by design’ is not new, but for some, it can seem to be something of a pipe dream. Security leaders purchase security technology in the hope it will keep their organization secure and allow it to operate efficiently and compliantly, with maximum visibility.

However, the reality is that technology (old and new) alone does not always ensure security by design, and other factors must also be considered to reach that end goal.

This webinar will explore various tactics and strategies for ensuring that your organization is secure by design, outline how you can get the maximum functionality from your existing assets and ask if compliance with GDPR and other regulations can ever be fully achieved.

Key takeaways:

  • Understand what secure by design actually means generally, and specifically for you
  • How to get the most from your existing assets and your security spend
  • How being secure by design can ensure a better standard of compliance
  • Managing endpoints efficiently and reduce the attack surface

Speakers

Photo of Greg Day

Greg Day

Vice President and Regional Chief Security Officer, EMEA, Palo Alto Networks

Photo of Rory Duncan

Rory Duncan

Security GtM Leader, NTT Ltd

Photo of Raef  Meeuwisse

Raef Meeuwisse

CISM, CISA, Author of Cybersecurity for Beginners

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.