Where Information Security Meets Physical Security: How to Protect Your Company’s Assets by Ensuring Nothing Falls Through the Gap

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Information and physical security systems often operate as independent technology silos in enterprises, causing potential gaps between organisations’ networks, applications and building security. Consolidating the two disciplines can enhance security, as well as your company’s bank balance.

Protecting information resources and data is one side of securing your organisation. Without the support of physical security, however, information security becomes a much harder job.
Technological shifts, budgetary realities and government initiatives are now driving enterprises to integrate physical and information security and access.

As well as enabling everything from secure access to facilities, strong authentication to desktops and network resources, and digital signature capabilities, convergence saves money in the process.

It's also worth noting that, in the US, Homeland Security Presidential Directive 12 (HSPD-12) establishes a requirement for a common identification credential for government employees and contractors for both logical and physical access to government resources.

And it's against this backdrop that this webinar will help you enhance your security controls, as well as assist you in extracting the best value for money from your systems.

Along the way, you will...

  • Learn why a single smart card authentication system is not always to best option - and can actually cost you more in the longer term
  • Understand why consolidated physical and logical access can generate a better ROI for your security platform
  • Be able to develop a more effective privileged account control security strategy

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.


Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Steve Gold

Steve Gold, Infosecurity Magazine

    Mike Moir

    Mike Moir Senior Product Manager, Entrust