Developing and Managing an Endpoint Security Strategy for Your Enterprise

Wireless devices. Mobile laptops that could be booted up from anywhere. Desktop systems loaded with sensitive information. Smartphones and smart TVs. For the IT security manager, the concept of “endpoint security” has evolved significantly over the past year or two. How is your enterprise approaching the endpoint security problem? In this webinar, experts offer advice and recommendations on how to build an endpoint security strategy that works across all of the devices that the end user might employ. You’ll also get insight on how to develop a consistent endpoint security strategy that works for all of your end users, no matter what their roles or applications.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Reassess how to define "endpoint"
  • Identify strategies for defending those devices that cannot be secured with traditional endpoint protection tools
  • Learn what security measures are most effective against ransomware and other leading threats to your endpoints
  • Get tips for patching, monitoring and managing remote workers' devices

Featured Speakers

  • Stacey Halota
    Stacey Halota
    Vice President–Information Security and Privacy
    Graham Holdings Company

    Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003. Graham Holdings is a diversified education and media company whose operations include educational services, television broadcasting, online, print and local TV news, home health and hospice care, manufacturing, car dealerships and restaurants. She leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance and other data protection efforts. Stacey has more than 25 years of experience in the information technology, security and privacy field. Before joining Graham Holdings, she served as the federal government and southeast region leader of Guardent (now part of Verisign), a security and privacy consulting and managed security services company. Prior to Guardent, she worked at PricewaterhouseCoopers in the Technology Risk Services consulting practice working with federal government and Fortune 500 clients. Stacey is a past recipient of Secure Computing Magazine’s Chief Security Officer of the Year award and was also named Mid-Atlantic Information Security Executive of the Year (Commercial Category) by the Executive Alliance. She is a Certified Information Systems Security Professional (CISSP), a Certified Information Privacy Professional (CIPP) and a Certified Information Systems Auditor (CISA). Stacey is a frequent speaker on information security and privacy topics and is on the strategic advisory boards of CyberVista and Y/L Ventures.

  • Nadav Maman
    Nadav Maman
    CTO & Co-Founder
    Deep Instinct

    Mr. Maman has over 15 years of experience in customer-driven businesses and technical leadership. He has a proven track record in senior management positions. Mr. Maman was managing technical complex cyber projects, including design and execution, pre-sales and post-sales. Mr. Maman held various senior management positions in Check Point Software technologies for over six years. Mr. Maman has vast hands-on experience with data security, network design, and implementation of complex heterogeneous environments. He was an intelligence officer in a well-known IDF technological cyber unit for five years. Mr. Maman was recruited to Israel’s top technology intelligence unit, where he led design and establishment of military data security infrastructures.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By