Understanding and Prioritizing Today's Threats
Kelly Jackson Higgins
Kelly Jackson Higgins
Kelly Jackson Higgins is Senior Editor at Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, includingNetwork Computing, Secure Enterprise Magazine, CommunicationsWeek, Virginia Business magazine, and other major media properties.
Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the U.S. Follow her on Twitter @kjhiggins.
Chief Technology Officer
Marc leads BeyondTrust’s Advanced Research labs, responsible for identifying new trends in enterprise security for the benefit of the BeyondTrust product roadmap. Marc Maiffret joined BeyondTrust via the acquisition of eEye Digital Security, which he co-founded in 1998 and served as Chief Technology Officer. Marc is an industry visionary having created one of the first Vulnerability Management and also Web Application Firewall products which have been deployed worldwide and won numerous product awards. Marc is also a security research pioneer, credited with discovering some of the first major vulnerability discoveries in Microsoft software and leading one of the world’s most renowned security research teams. This has led to Marc accepting three separate invitations to testify before the United States Congress on matters of national cybersecurity and critical infrastructure protection. Marc famously discovered the first Microsoft computer worm, “CodeRed” and was named one of People Magazine’s 30 People Under 30.
Partner with Bishop Fox
Vincent Liu, CISSP, is a partner with Bishop Fox. He oversees firm strategy, practice development, and client matters. Vincent’s primary areas of expertise are enterprise security programs and security architecture.
Prior to founding Bishop Fox, Vincent led the Attack and Penetration and Reverse Engineering teams for the Global Security group at Honeywell International. He has also worked as a consultant with the Ernst & Young Advanced Security Centers and as an analyst at the National Security Agency.
Security is no one-size-fits-all endeavor. In this Webcast, you will learn from the experts how to determine and prioritize which threats apply to your enterprise and how to build in the appropriate defenses against today's constantly evolving attacks.
This webinar will provide insight and advice from renowned security experts on how to:
- identify which new and existing threats could be used against your organization
- prioritize these applicable threats
- pinpoint the proper security practices and processes to protect your resources
- find possible weak links in your infrastructure that could be abused
- establish a strategy for triaging new threats
With the overload of information today on new threats, vulnerabilities, and attack campaigns, taking action to protect your organization can be an overwhelming and daunting task. This webinar will help you sift through the growing threat landscape in order to more efficiently and properly prepare your infrastructure for potential attacks.