Choosing the Right Strategies for Endpoint Security

There are many tools for protecting enterprise endpoints from attack, but most organizations still do not have a comprehensive strategy for endpoint protection that extends across the enterprise. In this webinar, experts will discuss methods for rationalizing endpoint protection tools and strategies and building a comprehensive strategy that works across the entire organization.

Available:
Wed, Jan 23, 2019 10:00 AM PST / 01:00 PM EST
Duration:
1h 00min

Attend this webinar to:

  • Get up-to-date on the newest threats to enterprise endpoints
  • Examine tools and strategies to combat attackers' lateral movement
  • Learn what role deep learning technologies can play in your defense
  • Come away with a blueprint for renewing your endpoint security strategy for the future

Featured Speakers

  • Gal Shpantzer
    Gal Shpantzer
    Independent Security Professional

    Gal Shpantzer has over 15 years of experience as an independent security professional and is a trusted advisor to CISOs of large corporations, technology and pharma startups, Ivy League universities and non-profits/NGOs. Since 2014, Gal has focused on emerging threats to availability as well as confidentiality (ransomware and destructive attacks). Gal has been involved in multiple SANS Institute projects since 2002, including co-editing the SANS Newsbites, revising the E-Warfare course and presenting on cyberstalking, CAPTCHAs, endpoint security and hardware roots of trust. In 2009, he founded and led the privacy subgroup of the NIST Smart Grid cybersecurity task group, resulting in the privacy chapter of NIST IR 7628. He is a co-author of the Managing Mobile Device Security chapter in the 6th ed. Vol 4 of the Information Security Management Handbook (2010) with the late Dr. Eugene Schultz, and is a technical editor of an upcoming O'Reilly book on defensive security (2017). Gal collaborated with Dr. Christophe Veltsos to present the ongoing Security Outliers project, focusing on the role of culture in risk management at RSA, CSI, BSides and Baythreat conferences. Most recently, he was involved as a subject matter expert in the development of the U.S. Department of Energy’s Electric Sector Cybersecurity Capability Maturity Model (ESC2M2) in 2012, and is launching the Incident Response Execution Standard project late 2016. Gal was also involved in the Infosec Burnout research project and co-presented on this topic at BSides-Las Vegas and RSA.

  • Yaniv Shechtman
    Yaniv Shechtman
    Chief Product Officer
    Deep Instinct

    Yaniv brings more than 10 years of experience in the Product Management area, specializing in Cyber security, Enterprise IT and Mobile products. In his role as the CPO, Yaniv is responsible for all aspects of the company's products including strategy, roadmap, promoting technological relations and cooperation, working with analysts, regulatory bodies and standards. Prior to Deep Instinct Yaniv held product management and development positions in leading companies, most recently as a product manager at Palo Alto Networks

  • Tim Wilson
    Tim Wilson
    Editor in Chief
    Dark Reading

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

Sponsored By