Starting in early September, I’ll be doing a series of webcasts digging into the Endpoint Security Fundamentals paper we published over the summer. Since there is a lot of ground to cover, we’ll be doing three separate webcasts, each focused on a different aspect.
The webcasts will be very little talking-head stuff (you can read the paper for that). We’ll spend most of the time doing Q&A. So check out the paper, bring your questions, and have a good time.
As with the paper, Lumension Security is sponsoring the webcasts. You can sign up for a specific webcast (or all 3) by clicking here.
Here is the description:
Endpoint Security Fundamentals
In today’s mobile, always on business environment, information is moving further away from the corporate boundaries to the endpoints. Cyber criminals have more opportunities than ever to gain unauthorized access to valuable data. Endpoints now store the crown jewels; including financial records, medical records, trade secrets, customer lists, classified information, etc. Such valuable data fuels the on-demand business environment, but also creates a dilemma for security professionals to determine the best way to protect it.
This three part webcast series on Endpoint Security Fundamentals examines how to build a real-world, defense-in-depth security program – one that is sustainable and does not impede business productivity. Experts who will lead the discussion are Mike Rothman, Analyst and President of Securosis, and Jeff Hughes, Director of Solution Marketing with Lumension.
Part 1 – Finding and Fixing the Leaky Buckets
September 8, 2010 11 AM ET (Register Here)
Part 1 of this webcast series will discuss the first steps to understanding your IT risk and creating the necessary visibility to set up a healthy endpoint security program. We will examine:
- The fundamental steps you should take before implementing security enforcement solutions
- How to effectively prioritize your IT risks so that you are focusing on what matters most
- How to act on the information that you gather through your assessment and prioritization efforts
- How to get some “quick wins” and effectively communicate security challenges with your senior management
Part 2 – Leveraging the Right Enforcement Controls
September 22, 2010 11 AM ET (Register Here)
Part 2 of this webcast series examines key enforcement controls including:
- How to automate the update and patch management process across applications and operating systems to ensure all software is current
- How to define and enforce standardized and secure endpoint configurations
- How to effectively layer your defense and the evolving role that application whitelisting plays
- How to implement USB device control and encryption technologies to protect data
Part 3 – Building the Endpoint Security Program
October 6, 2010 11 AM ET (Register Here)
In this final webcast of our series, we take the steps and enforcement controls discussed from webcasts 1 and 2 and discuss how to meld them into a true program, including:
- How to manage expectations and define success
- How to effectively train your users about policies and how to ensure two-way communication to evolve policies as needed
- How to effectively respond to incidents when they occur to minimize potential damage
- How to document and report on your overall security and IT risk posture
Hope to see you for all three events.
Comments