Building Asset Management into Your Enterprise Security Strategy

A key reason for many enterprise security breaches is that security teams find themselves supporting systems, applications, and devices that they didn’t know they had. Often, attackers exploit these “blind spots” by introducing devices or code that appears to be legitimate. How can you get a complete picture of your IT assets – and identify rogue components that might present a threat to your enterprise?

In this webinar, experts discuss methods and technologies for gaining a more complete picture of your IT environment, and for securing or eliminating unknown elements that attempt to use your network.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Learn what tools can help you build an accurate inventory of your remote endpoints
  • Empower your patch management and compliance programs with better visibility into all your IT assets
  • Know how to track down and observe all that "shadow IT" lurking in your environment (and your nightmares)

Featured Speakers

  • Stacey Halota
    Stacey Halota
    Vice President-Information Security and Privacy
    Graham Holdings Company

    Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003. Graham Holdings is a diversified education and media company whose operations include educational services, television broadcasting, online, print and local TV news, home health and hospice care, manufacturing, car dealerships and restaurants. She leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance and other data protection efforts. Stacey has more than 25 years of experience in the information technology, security and privacy field. Before joining Graham Holdings, she served as the federal government and southeast region leader of Guardent (now part of Verisign), a security and privacy consulting and managed security services company. Prior to Guardent, she worked at PricewaterhouseCoopers in the Technology Risk Services consulting practice working with federal government and Fortune 500 clients. Stacey is a past recipient of Secure Computing Magazine’s Chief Security Officer of the Year award and was also named Mid-Atlantic Information Security Executive of the Year (Commercial Category) by the Executive Alliance. She is a Certified Information Systems Security Professional (CISSP), and a Certified Information Privacy Professional (CIPP). Stacey is a frequent speaker on information security and privacy topics and is on the strategic advisory boards of CyberVista and Y/L Ventures.

  • Ed Rossi
    Ed Rossi
    Vice President, Product Management, Asset Inventory and Discovery
    Qualys

    Ed Rossi is an experienced product management leader with over 20 years in the IT Asset Management and Software Asset Management space. He recently joined Qualys as Vice President, Product Management, focused on Asset Inventory & Discovery. Ed spent six years at Flexera Software, leading the product team driving their ITAM & SAM offerings and concentrating on helping clients manage their technology investment from on-premises hardware and software to SaaS & Cloud Infrastructure. Previously, Ed was with IBM, where he focused on IT Asset Management, Discovery & Service Management products across several roles. Ed is passionate about the need for strong visibility across the IT ecosystem to support a strong IT Security program and to manage assets more effectively in an increasingly complex technological world.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By