Staying one step ahead in the IT protection wars

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

The Internet security landscape has changed dramatically. The days of `hobbyist' virus writers causing outbreaks as a nuisance or show of bravado have passed. Profit-driven cybercriminals lurk behind most Web threats today, creating a new generation of malware that drives a powerful underground economy. Against this backdrop, cybercriminals have continued to advance their malware development skills, whilst the security industry has responded with new technologies to combat these threats. Most recently, however, there has been explosion of new and multi-dimensional threats, as well as co-ordinated attacks, that can cause significant damage. These attacks can cause financial losses, identity theft, and loss of intellectual property or trade secrets to name a few. Conventional malware protection relies on the collation and distribution of patterns, a process that has become logistically difficult owing to the high numbers and short timescales involved. The security industry has reacted to this increasing variety of malware by issuing more frequent updates. This can have a significant impact on the system and network resources required to manage pattern downloads, often leading to critical performance and cost issues. This Webinar will highlight a new approach - the smart protection network. In this webinar, you will: * Help attendees learn what a smart protection network is and how it works * Detail the limitations of conventional anti-malware technology * Explain how companies need to prepare for the security seachange that Cloud Computing engenders. * Assist managers in their ongoing battle against malware and other hacker threats This webinar is aimed at: * IT managers who are frustrated by the limitations of conventional ITsec technology * IT users who want to learn more about Cloud Computing security * Anyone with an interest in enhancing their understanding of next-gen IT security


Raimund Genes

Raimund Genes CTO Malware & General Manager, Trend Micro

    Steve Gold

    Steve Gold, Infosecurity Magazine

      Simon Perry

      Simon Perry Principal Associate Analyst, Quocirca

        John Pironti

        John Pironti Chief Information Risk Strategist, CompuCom