How to Build a Successful Cyber Threat Defense Program

Live Webinar with Former CISO of DuPont Larry Brock Offers Strategies on How to Build a Sustainable Program

  • Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a friend

Larry Brock

With proactive prevention it is infinitely possible to protect sensitive information and enable users to be productive.

WALTHAM, Mass. (PRWEB) August 22, 2013

Public and private sector organizations with responsibility for protecting their systems against increasingly sophisticated cyber attacks can learn strategies and real world examples on how to build a sustainable and successful program with a free live webinar featuring Larry Brock, President of Brock Consulting and former Chief Information Security Officer (CISO) at DuPont. The webinar is hosted by Verdasys and will be held Thurs., August 29, 2013, at 10 a.m. ET/3:00 GMT and 2 p.m. ET. To register, go to: http://www2.verdasys.com/l/17352/2013-07-26/bj22y.

Brock is president of Brock Cyber Consulting and an expert on designing effective strategies for detecting, preventing, containing and investigating advanced cyber attacks. He was with DuPont for more than 30 years, most recently as CISO, and previously served as Information Security Officer within the U.S. Air Force assigned to the National Security Agency.

"The Center for Strategic and International Studies recently released a report on 'The Economic Impact of Cybercrime and Cyber Espionage' estimating over 500,000 US jobs have been lost as a result of malicious cyber activity," said Brock. "Security pros and business leaders that want to turn this tide can take critical steps now, such as creating security awareness and threat intelligence programs and incorporating technologies for securing outbound data and credentials. These approaches are proving successful in real-world implementations every day, confirming that with proactive prevention it is infinitely possible to protect sensitive information and enable users to be productive."

Live webinar attendees with learn how to:

  •     Create an “education culture” across the organization that minimizes attack risk
  •     Build a threat intelligence program that enables proactive prevention of malware attacks
  •     Deploy effective cyber containment controls to defend against zero-day attacks

Webinar host Verdasys provides Enterprise Information Protection (EIP) solutions and managed services for enterprise and midmarket companies that need to safeguard sensitive data from insider and cyber threats, increase corporate compliance and enforce safe and secure data flows across enterprise business processes.

Register at: http://www2.verdasys.com/l/17352/2013-07-26/bj22y

About Verdasys
Verdasys (http://verdasys.com) provides Enterprise Information Protection solutions and managed services to secure sensitive data and assure the integrity of business processes, enabling midsize and global businesses to successfully compete in collaborative and mobile environments. Digital Guardian, a Leader in Gartner’s Magic Quadrant for Content-Aware Data Loss Prevention, is a proven technology platform that provides complete, policy-based data lifecycle monitoring, classification, control and forensics on endpoints and servers, virtual machines and enterprise applications, networks, mobile devices and cloud environments. Digital Guardian protects IP and regulated data from compromise by insiders, contractors, partners and targeted cyber attacks. Since 2003, millions of Digital Guardian agents have been deployed to protect critical data for global leaders in manufacturing, pharmaceuticals, high technology, energy, financial services and government.

# # #
Contact: Betsy Kosheff, 413-232-7057 bkosheff(at)verdasys(dot)com


Contact

Follow us on: Contact's Facebook Contact's Twitter Contact's LinkedIn

Attachments

Cyber Attack Whitepaper Cyber Attack Whitepaper

A Kill Chain Strategy for Defending Against Cyber Attack