Start focusing on what matters, balancing compliance with true security monitoring and protection
Sponsored by: CenturyLink
April 11, 2016
View On-Demand
It’s easy to talk about compliance and threat detection. It is much harder to figure out how to get it done. In 2015, we saw CIOs losing their jobs due to data breaches. We saw business leaders go to jail for information-based fraud and abuse. And we continue to see and hear about companies struggling to survive due to poor use of information in powering business outcomes.
Juniper Research recently reported that data breaches will cost $2.1 trillion globally by 2019. That’s almost four times the estimated financial toll of breaches in 2015. As cloud computing becomes more popular, it will become the target of more malicious attacks.
There is no single silver bullet around security. As big data gives way to the Internet of Things, the opportunities — and risks — are growing faster than any individual or enterprise can manage.
As a part of this webinar, you’ll learn five best practices to adopt a threat-centric posture in your organization and exactly how to make information risk, security and compliance the top of your agenda for the remainder of 2016. The webinar will also cover:
The modern threat landscape and the impacts of IoT on security
The industrialization and economization of hacking
Solving the security and compliance challenge
Creating a threat-centric security model
Register Now!
If you have already registered, click here to access
Speaker:
Bill Kleyman, Vice President of Strategy and Innovation, MTM Technologies is an enthusiastic technologist with experience in datacenter design, management, and deployment. His architecture work includes large virtualization and cloud deployments as well as business network design and implementation. Bill enjoys writing, blogging, and educating colleagues around everything that is technology. During the day, Bill is the Vice President of Strategy and Innovation at MTM Technologies, where he interacts with enterprise organizations and helps align IT strategies with direct business goals. Bill’s whitepapers, articles, video blogs and podcasts have been published and referenced on InformationWeek, NetworkComputing, TechTarget, DarkReading, Data Center Knowledge, CBS Interactive, Slashdot, and many others. Most recently, Bill was ranked #22 in the Onalytica study which reviewed the top 100 most influential individuals in the cloud landscape, globally.
Nathan Shanks, Director, Security Implementation and Management Services, IT Security Services, CenturyLink
Nathan has over 22 years IT services experience, 19 of which focused on security services. He comes to CenturyLink as the former Founder and CEO of netAura (which was recently acquired by CenturyLink). In his role as Director of Security Implementation and Management Services, Nathan brings engineering and custom security solutions expertise for enterprises and government units, and consulting on security solutions.
Prior to CenturyLink, Nathan had 15 years’ experience as an IT architect supporting fortune 100 companies, was a Sr. Manager of analytics and engineering at Unisys, and a Director of Federal services at Qualys.
He is largely focused on engineering, analysis and solution design focused on complex enterprise, and has extensive cloud and hosted security service experience.
About the Author
You May Also Like