Securing Your Windows 10 Estate

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Microsoft launched Windows 10 this summer with great fanfare, providing the upgrade as a downloadable freebie to Windows 7 and 8 users. Implementing Windows 10 across your organization will almost certainly  deliver a number of business benefits, but from a security perspective any roll out of a new, or upgraded, operating system isn’t going to be risk free.

So does Windows 10 stack up, as billed, as the most secure version of the venerable OS, especially in the enterprise?

This webinar will investigate what it takes to ensure the security status of your new Windows 10 estate. We’ll examine:

  • How a Windows 10 environment allows you to protect, detect and respond to the latest generation of security threats
  • Where new insecurity challenges may emerge through migration from legacy Windows versions
  • What should be the new patching strategy and what should be done regarding out-of-the-box defaults, malware and authentication
  • How techniques such as virtualization can be deployed to enhance security


Amar Singh

CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

    Andy Struys

    Sr. Solution Architect EMEA, Dell

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.