Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Virtual machines vs real cybercriminals - is your v-security up to scratch?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Large numbers of corporations are migrating their IT resources to a virtual machine environment - largely thanks to the cost savings and convenience that the leading edge technology offers. But the security strategies required for thus brave new virtual world are radically different to those most of us are experience in. 

Join us for an informative 60 minute webinar in which our panel of experts - including key Symantec and VMware security experts - will explain what security planning strategies and technology solutions can assist IT professionals tasked with moving their business IT systems over to a virtual platform.
 
Along the way you will learn about:
  • The security strategies needed to defend a virtual environment
  • The security solutions needed to defend your virtual platform
  • What existing security systems can be redeployed for virtual IT
  • What attack strategies cybercriminals are using against v-systems
  • How to raise your security game in an evolving virtual world  
This webinar is for: 
  • CSOs and CISOs looking for answers to virtualized security challenges
  • IT security professionals seeking answers to virtualized security questions
  • IT security managers wanting to understand the nature of v-security
  • IT professionals looking for the v-security strategies/solutions that matter
  • Anyone wanting to better understand the security challenges that virtualization creates for IT professionals and their managers

 CISSP SSCP logo

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

 

Speakers

Richard Garsthagen

Richard Garsthagen Senior Evangelist, Products & Marketing, EMEA

    Steve Gold

    Steve Gold, Infosecurity Magazine

      Siân John

      Siân John Security Strategist for the UK and Ireland, Symantec