|
Poking Holes in Your Security Strategy: How to Protect Your Business
On Demand Until October 9, 2019
Abstract:
Without a doubt, security and compliance standards are an even greater concern for today’s organizations as the landscape of potential vulnerabilities continues to grow and shift. Cyberattacks stem directly from the lack of development and enforcement of stringent security processes and protocols, and the most intrusive and harmful attacks are actually the ones related to low-level security holes which are exacerbated by the challenge of data constantly in transit.
A reliable, successful cybersecurity plan starts with a ground-up approach: from supporting technology to virtual and physical security, backed by continuously tested procedures and protocols that account for the dynamic nature of data breaches. This webinar will outline the key elements of a comprehensive, ground-up security and compliance strategy to prepare today’s businesses to enhance security and thwart cyberattacks.
Learning Objectives:
Attendees of this webinar will be able to:
- Review the definitions of security, compliance, and elements of a comprehensive cybersecurity strategy
- Understand the most common causes of low-level security holes that lead to dangerous vulnerabilities
- Achieve an overview of the steps and best practices inherent to a “ground up” cybersecurity approach
- Prepare for the continuous evaluation of security and compliance procedures and processes
Can't attend live? Register to view the webinar on-demand!
Speaker
Destiny Bertucci Head Geek SolarWinds Bertucci holds a broad array of certifications and degrees, such as CCNA, (ISC)² Methodologies, CompTIA IT Operations Specialist (CIOS), CompTIA Secure Infrastructure Specialist (CSIS), INFOSEC, database development degree, BS IT Security, and SolarWinds Certified Professional®. In her 16 years as a network manager, she has worked in healthcare, federal, and application engineering, allowing her to be a successful SolarWinds senior application engineer for over nine years.
She started her networking career in 2001 by earning CCNA/Security+ certification and launching a networking consultant business. After using SolarWinds®tools for many years, she joined the company and continued earning certifications and degrees to expand her professional reach into database development and (ISC)² methodologies. Customizing SolarWinds products, while working on setups and performance, deepened her knowledge of the complete SolarWinds product line. She is now skilled and experienced in network, security, application, server, virtualization, cloud, and database management.
|
Poking Holes in Your Security Strategy: How to Protect Your Business
Registration Is Closed
|
|
|
By clicking “register”, you acknowledge that you have read BNP Media’s Privacy Policy, agree to its terms, and consent to allow BNP Media to use your information consistent with the Privacy Policy. You agree your information submitted will be shared with the sponsor(s) of the webinar. To read our Privacy Policy, please click here.
|