Taking a Zero Trust Approach to Malware

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Malware-based attacks are growing in prevalence and sophistication and are increasingly difficult for organizations to tackle. Anti-malware and sandbox technologies have long been status quo, but cracks are beginning to show in this environment. Detection-based solutions struggle with emerging, unknown threats, and sandboxes can slow system performance and negatively impact user productivity.

Therefore, it is essential that organizations shift from a detection to prevention model and apply a Zero Trust principle to malware protection. One such approach, Zero Trust Content Disarm & Reconstruction (CDR), deconstructs data such as PDFs, files, and images to remove threats, and then reconstructs them entirely into brand-new, pixel-perfect, fully revisited data in near real-time, all before a user opens them.

In this webinar, an expert panel will discuss current challenges in dealing with malware-based attacks and how new approaches such as Zero Trust CDR have the potential to radically transform security in sectors like finance.

Join this session to find out:

  • How malware threats are evolving, and the drawbacks of current security approaches
  • How to shift to the Zero Trust principle in malware protection
  • How to prevent the next big cyber-attack in sectors like finance


James Coker

Deputy Editor, Infosecurity Magazine

Paul  Holland

Principle Research Analyst, Information Security Forum

Phil Robinson

principal security consultant and founder, Prism Infosec

Alex Tasker

Sales Engineer, Forcepoint

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Forcepoint's privacy policy here: https://www.forcepoint.com/tr/company/privacy-policy. Please see Infosecurity Magazine’s privacy policy for additional information.