Securing Your Windows 10 Estate

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Microsoft launched Windows 10 this summer with great fanfare, providing the upgrade as a downloadable freebie to Windows 7 and 8 users. Implementing Windows 10 across your organization will almost certainly  deliver a number of business benefits, but from a security perspective any roll out of a new, or upgraded, operating system isn’t going to be risk free.

So does Windows 10 stack up, as billed, as the most secure version of the venerable OS, especially in the enterprise?

This webinar will investigate what it takes to ensure the security status of your new Windows 10 estate. We’ll examine:

  • How a Windows 10 environment allows you to protect, detect and respond to the latest generation of security threats
  • Where new insecurity challenges may emerge through migration from legacy Windows versions
  • What should be the new patching strategy and what should be done regarding out-of-the-box defaults, malware and authentication
  • How techniques such as virtualization can be deployed to enhance security


Amar Singh

CISO and Founder Cyber Management Alliance and Give01Day, Cyber Management Alliance

    Andy Struys

    Sr. Solution Architect EMEA, Dell

      Christian Toon

      Senior Cyber Security Expert, PwC UK

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.