ISMG’s Virtual Roundtables focus on specific challenges being faced by information security executives in today’s cybersecurity landscape. Moderated by one of ISMG’s Executive Editors and a guest industry expert, Virtual Roundtables give cybersecurity professionals the opportunity to discuss threats and controls with a handful of market leaders in an informal and online setting, from which you will emerge with new ideas and solutions you can immediately put to work to improve your own organization’s defensive posture.
Moving from a Reactive to Preventative Endpoint Security Strategy
(Interview hosted by Nick Holland, ISMG, and Morey Haber, BeyondTrust)
Scott Ferguson – Executive Editor, ISMG / Morey Haber – CTO and CISO, BeyondTrust
In today’s threat environment, breaches seem inevitable. While the risk of a breach can be significantly mitigated with detection measures, preventative measures should also be in place. Evolving cyber threats, increasingly complex and diverse endpoint environments, corporate misalignment of security technologies to threats, and ever-more stretched IT and InfoSec teams are just some of the many colliding factors that put an organization’s universe of endpoints at risk, and therefore, the entire network.
Is your current Endpoint Security strategy obsolete? It’s time to take a new approach.
Please join ISMG’s Scott Ferguson for an exclusive Virtual Roundtable that will draw from the experiences of the attendees, offering thoughts on the challenges of managing endpoint detection and response in today’s challenging environment.
Discussion topics will include:
- What are the most significant challenges of managing endpoint security today?
- How can I gather a more holistic view of my attack surface?
- How can I transition to a more preventative endpoint security posture?
Joining Scott to provide expert insight and case studies is Morey Haber, CTO and CISO at BeyondTrust.
Date: Tuesday, December 8th, 2020
Time: 4:00 PM – 5:30 PM ET
Moderator: Scott Ferguson
About the Sponsor
BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. BeyondTrust gives organizations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com.