Taking a Zero Trust Approach to Malware

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Malware-based attacks are growing in prevalence and sophistication and are increasingly difficult for organizations to tackle. Anti-malware and sandbox technologies have long been status quo, but cracks are beginning to show in this environment. Detection-based solutions struggle with emerging, unknown threats, and sandboxes can slow system performance and negatively impact user productivity.

Therefore, it is essential that organizations shift from a detection to prevention model and apply a Zero Trust principle to malware protection. One such approach, Zero Trust Content Disarm & Reconstruction (CDR), deconstructs data such as PDFs, files, and images to remove threats, and then reconstructs them entirely into brand-new, pixel-perfect, fully revisited data in near real-time, all before a user opens them.

In this webinar, an expert panel will discuss current challenges in dealing with malware-based attacks and how new approaches such as Zero Trust CDR have the potential to radically transform security in sectors like finance.

Join this session to find out:

  • How malware threats are evolving, and the drawbacks of current security approaches
  • How to shift to the Zero Trust principle in malware protection
  • How to prevent the next big cyber-attack in sectors like finance


Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Paul  Holland

Paul Holland

Principle Research Analyst, Information Security Forum

Photo of Phil Robinson

Phil Robinson

principal security consultant and founder, Prism Infosec

Photo of Alex Tasker

Alex Tasker

Sales Engineer, Forcepoint

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Forcepoint here: https://www.forcepoint.com/tr/company/privacy-policy. Please see Infosecurity Magazine’s privacy policy for more information.