Understanding the IT security total cost of ownership puzzle

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

IT security and the financial function are starting to become happy partners, now that key performance indicators (KPIs) and total cost of ownership (TCO) figures can be created for most IT systems and software.

Join us for an entertaining and informative webinar in which we'll explain how to balance the requirement of future-proofing your IT security resource, whilst at the same time balancing the time and budget issues that also come to the fore.

Along the way you'll learn about how to effectively counter the latest threat landscape and attack vectors, without breaking your budget or putting your business at risk.

This webinar will:

  • Help you achieve savings on ITsec capital expenditure
  • Explain how operational expenditure can be made more cost-effective
  • Detail some of the reasons why ITsec and financial professionals are starting to work together on countering the multi-vectored threats that the Internet, email and Web 2.0 services create.

This webinar is for:

  • ITsec professionals looking to better understand the nature of the modern security threat landscape
  • Financial professionals wanting to understand the world of their ITsec colleagues
  • Managers wanting a run-down on modern IT security threats and how they can be countered without breaking the bank
  • Anyone seeking advice on modern IT security warfare

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.


Steve Gold

Infosecurity Magazine

Caroline Ikomi

Technical Director, Check Point Software Technologies

Adrian Spearen

Account Director, Major Accounts, Check Point Software Technologies

Photo of Bob Tarzey

Bob Tarzey

Analyst and Director, Quocirca

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.