With the growing size and maturity of businesses, the complexity of IT environments increases, expanding the potential attack surface for advanced and targeted attacks. Organizations need a cost-effective way of securing their assets. Join Kaspersky’s Webinar “How to Overcome Advanced Threats and Targeted Attacks?” and learn from Forrester about its Zero Thrust framework that presents an analysis of the maturity and business value of technologies that support Zero Trust threat detection and response. You will also learn from Kaspersky how the combination of its threat detection and response technologies and services can help mature, midsize and large organizations focus on advanced detection and fast response to advanced threats and target attacks that try to circumvent automated preventive technologies. Our speakers for the session: Josh Zelonis – Guest Speaker and Senior analyst at Forrester Research Josh is a senior analyst at Forrester, serving Security & Risk Professionals. He covers security architecture and operations, with a focus on cyberthreat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response. Jibril Hassan - Executive Pre-Sales Manager and Threat Management and Defense Soliton Product Champion at Kaspersky. Jibril's extensive IT experience spans over 15 years, with information security being the focus in the last 10 years. His technical engineering background includes various roles previously held at DELL-EMC, RSA Security, McAfee and AAM Group.

Hora

10:00 - 11:00 hs GMT+1

Organizador

Kaspersky webinars
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 788 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020