Secure the Endpoint to battle Cyberthreats

  • Tuesday, 04 Aug 2015 1:00PM EDT (04 Aug 2015 17:00 UTC)
  • Speakers: John Pescatore, Kat Pelak

Attackers continue to evolve their techniques, with increased targeting,evasion and sophistication. A common denominator of the most damagingbreaches have been the attacker's ability to compromise user endpoints andfrom there cause immense business damage by compromising critical internalservers and stealing business and customer information. Many enterpriseendpoint defense strategies continue to rely on outdated endpointantiviral signature-based approaches, while others have tried \spending indepth" - adding multiple and uncoordinated endpoint security agents in thehopes of seeing security increase. Neither approach has been effectiveagainst advanced targeted attacks.

Enterprises need an endpoint security strategy that implements therelevant controls and that integrates with network security controls andanalytics, as well.

Added protection doesn't need to add complexity and Critical SecurityControls provides a proven basis for focusing on the most effectivetechniques for detecting and preventing real world attacks.

This webinar will provide an update on the both threat environment, thelatest draft update to the Critical Security Controls and a demo oflayered critical protection that stops malicious attacks.