Taking IT security to the next level

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

There is a major battle taking place in the IT security marketplace because, with the current economic downturn, organised criminal gangs are taking a much more robust approach to generating extra income.

And, as data leakage events such as the Heartland payment card saga of recent days has proven, IT managers now need to cost-effectively use every facility at their disposal in order to protect their company's IT resources.

In this webinar, you will:

  • Show you how harness the power of host intrusion technology to bolster our IT security arsenal.
  • Assist attendees in developing systems that detect and deploy security patches automatically.
  • Detail the importance of a centralised patch and endpoint management platform in mid-sized and enterprise operations.
  • Help IT managers understand how systems management fits into the modern security equation.
  • Explain how to prevent costly security breaches and data losses.

This webinar is aimed at:

  • Managers with an interest in expanding their ITsec knowledge.
  • IT managers who are concerned about their security regulatory and compliance needs.
  • Anyone seeking to understand how the security management process has changed in the last few years

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.


Steve Gold

Steve Gold, Infosecurity Magazine

    David Johnson

    David Johnson Director of Product Marketing for Management and S

      Marcel Kisch

      Marcel Kisch IT Security Specialist, KPMG Germany

        Nigel Stanley

        CTO for OT and Industrial Cybersecurity, TUV Rheinland