Virtual machines vs real cybercriminals - is your v-security up to scratch?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Large numbers of corporations are migrating their IT resources to a virtual machine environment - largely thanks to the cost savings and convenience that the leading edge technology offers. But the security strategies required for thus brave new virtual world are radically different to those most of us are experience in. 

Join us for an informative 60 minute webinar in which our panel of experts - including key Symantec and VMware security experts - will explain what security planning strategies and technology solutions can assist IT professionals tasked with moving their business IT systems over to a virtual platform.
 
Along the way you will learn about:
  • The security strategies needed to defend a virtual environment
  • The security solutions needed to defend your virtual platform
  • What existing security systems can be redeployed for virtual IT
  • What attack strategies cybercriminals are using against v-systems
  • How to raise your security game in an evolving virtual world  
This webinar is for: 
  • CSOs and CISOs looking for answers to virtualized security challenges
  • IT security professionals seeking answers to virtualized security questions
  • IT security managers wanting to understand the nature of v-security
  • IT professionals looking for the v-security strategies/solutions that matter
  • Anyone wanting to better understand the security challenges that virtualization creates for IT professionals and their managers

 CISSP SSCP logo

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.

 

Speakers

Richard Garsthagen

Senior Evangelist, Products & Marketing, EMEA

Steve Gold

Infosecurity Magazine

Siân John

Security Strategist for the UK and Ireland, Symantec

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.