Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Understanding the IT security total cost of ownership puzzle

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

IT security and the financial function are starting to become happy partners, now that key performance indicators (KPIs) and total cost of ownership (TCO) figures can be created for most IT systems and software.

Join us for an entertaining and informative webinar in which we'll explain how to balance the requirement of future-proofing your IT security resource, whilst at the same time balancing the time and budget issues that also come to the fore.

Along the way you'll learn about how to effectively counter the latest threat landscape and attack vectors, without breaking your budget or putting your business at risk.


This webinar will:

  • Help you achieve savings on ITsec capital expenditure
     
  • Explain how operational expenditure can be made more cost-effective
     
  • Detail some of the reasons why ITsec and financial professionals are starting to work together on countering the multi-vectored threats that the Internet, email and Web 2.0 services create.


This webinar is for:

  • ITsec professionals looking to better understand the nature of the modern security threat landscape
     
  • Financial professionals wanting to understand the world of their ITsec colleagues
     
  • Managers wanting a run-down on modern IT security threats and how they can be countered without breaking the bank
     
  • Anyone seeking advice on modern IT security warfare

CISSP SSCP logo
CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

Speakers

Steve Gold

Steve Gold, Infosecurity Magazine

    Caroline Ikomi

    Caroline Ikomi Technical Director, Check Point Software Technologies

      Adrian Spearen

      Adrian Spearen Account Director, Major Accounts, Check Point Software Technologies

        Bob Tarzey

        Analyst and Director, Quocirca