Where Information Security Meets Physical Security: How to Protect Your Company’s Assets by Ensuring Nothing Falls Through the Gap

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Information and physical security systems often operate as independent technology silos in enterprises, causing potential gaps between organisations’ networks, applications and building security. Consolidating the two disciplines can enhance security, as well as your company’s bank balance.

Protecting information resources and data is one side of securing your organisation. Without the support of physical security, however, information security becomes a much harder job.
Technological shifts, budgetary realities and government initiatives are now driving enterprises to integrate physical and information security and access.

As well as enabling everything from secure access to facilities, strong authentication to desktops and network resources, and digital signature capabilities, convergence saves money in the process.

It's also worth noting that, in the US, Homeland Security Presidential Directive 12 (HSPD-12) establishes a requirement for a common identification credential for government employees and contractors for both logical and physical access to government resources.

And it's against this backdrop that this webinar will help you enhance your security controls, as well as assist you in extracting the best value for money from your systems.

Along the way, you will...

  • Learn why a single smart card authentication system is not always to best option - and can actually cost you more in the longer term
  • Understand why consolidated physical and logical access can generate a better ROI for your security platform
  • Be able to develop a more effective privileged account control security strategy

CISSP SSCP logo
CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

Speakers

Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Steve Gold

Infosecurity Magazine

Mike Moir

Senior Product Manager, Entrust

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.