Staying one step ahead in the IT protection wars

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The Internet security landscape has changed dramatically. The days of `hobbyist' virus writers causing outbreaks as a nuisance or show of bravado have passed. Profit-driven cybercriminals lurk behind most Web threats today, creating a new generation of malware that drives a powerful underground economy. Against this backdrop, cybercriminals have continued to advance their malware development skills, whilst the security industry has responded with new technologies to combat these threats. Most recently, however, there has been explosion of new and multi-dimensional threats, as well as co-ordinated attacks, that can cause significant damage. These attacks can cause financial losses, identity theft, and loss of intellectual property or trade secrets to name a few. Conventional malware protection relies on the collation and distribution of patterns, a process that has become logistically difficult owing to the high numbers and short timescales involved. The security industry has reacted to this increasing variety of malware by issuing more frequent updates. This can have a significant impact on the system and network resources required to manage pattern downloads, often leading to critical performance and cost issues. This Webinar will highlight a new approach - the smart protection network. In this webinar, you will: * Help attendees learn what a smart protection network is and how it works * Detail the limitations of conventional anti-malware technology * Explain how companies need to prepare for the security seachange that Cloud Computing engenders. * Assist managers in their ongoing battle against malware and other hacker threats This webinar is aimed at: * IT managers who are frustrated by the limitations of conventional ITsec technology * IT users who want to learn more about Cloud Computing security * Anyone with an interest in enhancing their understanding of next-gen IT security


Raimund Genes

CTO Malware & General Manager, Trend Micro

Steve Gold

Infosecurity Magazine

Simon Perry

Principal Associate Analyst, Quocirca

Photo of John Pironti

John Pironti

President at IP Architects, LLC

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.