Video: Securing the Modern Endpoint Perimeter Webinar
In this webinar, InfoTrust presented how the endpoint perimeter has evolved, what this has meant for the threat landscape and how cybercriminals are exploiting these digital transformations. We also evaluated good security practices all organisations should be undertaking and the importance of defence in breadth.
Agenda
Securing your perimeter
• What is the perimeter?
• Endpoint: the lowest common denominator
• Securing the interactions your staff have with your network
Good Security Practices (above & beyond AV)
• IT Hygiene
• Threat Intelligence
• Vulnerability Management
• Endpoint Management
Endpoint Protection Platforms
• Getting the most out of each of your products
• Defence in breadth
To access the recording today complete the form.
see our
Related resources
In this 45 minute session, InfoTrust and Mimecast email security experts broke down the different types of prevalent email attacks by their tactics and how these can be mitigated.
We looked at the attack chain for;
- Phishing attacks
- Business Email Compromise and Spear Phishing
- Account Takeover Attacks
- Ransomware Attacks
Giving examples of how each tactic evades your traditional security controls, and why next-generation solutions – specifically Secure Email Gateways, are a necessity for businesses.
In December 2019, InfoTrust’s Cyber Defence Team presented with Okta specialists on Zero Trust and how organisations can incorporate it into their security strategy. Our cloud security experts covered;
- What is Zero Trust and where did it come from? More than just a buzzword, a practical security strategy for businesses
- Why is Zero Trust needed as part of a holistic security strategy?
- The Zero Trust maturity curve and how your business can progress through it
- Frequently asked questions by organisations when on the Zero Trust journey
To watch the webinar recording fill out the form below.
In August 2019, InfoTrust’s Cyber Defence Team presented on the advanced threats that we are seeing in the market, and common email security challenges we help our customers solve in their ecosystem.
Richard, John, and Caitlin covered how your organisation can mitigate the risk of;
We're Here To Help