Developing the Right Strategy for Secure Email

Many of today's most damaging cyber attacks begin with a simple hack of the corporate email system. Yet many enterprises still don't have a unified approach to protecting their email and messaging systems, leaving themselves open to a wide range of online exploits. In this webinar, top experts discuss strategies for limiting access to critical email systems, when to encrypt email attachments and transmissions, and how to build a day-to-day process for protecting email against common cyber attacks.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Get a tour through the pros and cons of traditional email security measures (and learn why broad adoption has been such a challenge)
  • Learn how to adapt your email security model for the cloud and other technological advancements
  • Discover how the expanding privacy compliance landscape impacts messaging security practices
  • Understand why user-friendliness is so important to messaging security, and get a glimpse of the latest advancements in user-friendly end-to-end encryption
  • Leave with an implementation roadmap for an email security strategy that will help you balance risk and compliance needs into the future

Featured Speakers

  • Rob McDonald
    Rob McDonald
    VP of Product Management
    Virtru

    Rob McDonald is the VP of Product Management for Virtru and has been with the company since late 2013. Prior to Virtru Rob was listed by Beckers Review as 2013 and 2014 Top 100 Healthcare CIOs to Know through his work as a CIO for several Acute Care facilities and denovo Healthcare development teams. Rob has also consulted with corporations to help them assess their current information security position and develop a plan to not only mitigate the discovered technical shortcomings but more critically to raise security awareness amongst their employees. Rob holds BS from the University of Texas at Dallas in computer science and is a perpetual student of technology, information security, and privacy practices.

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By