Building a Better IT Security Architecture for Your Enterprise

Many enterprises invest heavily in specialized cyber defense technology -- but unless they also understand the business they are trying to defend, they will continue to fall prey to attackers. How can a security department find all the business's IT assets, prioritize the business's most valuable data, and develop cybersecurity strategies to defend those assets accordingly? How can a SOC be as quick to fix vulnerabilities as it is to find them them? How can a CISO be sure that they have built a cost-effective security architecture that still meets the needs of their organization? In this webinar, attendees will learn to build an overarching security architecture that is built on a stronger foundation and better anticipates the potential threats to your organization.

Available:
Wed, Oct 23, 2019 10:00 AM PDT / 01:00 PM EDT
Duration:
1h 00min

Attend this webinar and you'll learn:

  • Security leaders' most common architecture mistakes, and how to avoid them
  • Tips for making IT asset discovery and management easier
  • How to get the most out of your existing IT security investments and be smarter about what you do next

Featured Speakers

  • Stacey Halota
    Stacey Halota
    Vice President–Information Security and Privacy
    Graham Holdings Company

    Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003. Graham Holdings is a diversified education and media company whose operations include educational services, television broadcasting, online, print and local TV news, home health and hospice care, manufacturing, car dealerships and restaurants. She leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance and other data protection efforts. Stacey has more than 25 years of experience in the information technology, security and privacy field. Before joining Graham Holdings, she served as the federal government and southeast region leader of Guardent (now part of Verisign), a security and privacy consulting and managed security services company. Prior to Guardent, she worked at PricewaterhouseCoopers in the Technology Risk Services consulting practice working with federal government and Fortune 500 clients. Stacey is a past recipient of Secure Computing Magazine’s Chief Security Officer of the Year award and was also named Mid-Atlantic Information Security Executive of the Year (Commercial Category) by the Executive Alliance. She is a Certified Information Systems Security Professional (CISSP), a Certified Information Privacy Professional (CIPP) and a Certified Information Systems Auditor (CISA). Stacey is a frequent speaker on information security and privacy topics and is on the strategic advisory boards of CyberVista and Y/L Ventures.

  • Nathan Burke
    Nathan Burke
    Chief Marketing Officer
    Axonius

    Nathan Burke is the Chief Marketing Officer at Axonius. Passionate about bringing new technologies to market to solve real problems, he has held marketing leadership roles at Hexadite (acquired by Microsoft), Intralinks, MineralTree, CloudLock (acquired by Cisco), and is a frequent speaker and contributing author on topics related to the intersection of collaboration and security. He lives on Cape Cod with his wife, daughter, and dogs, and enjoys watching the unfairly dominant New England Patriots.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By