Dr. Estwick Moderating Webcast: Three-Prong Approach to Security

When:聽 July 27, 2017 @ 2:00 pm 鈥 3:00 pm EST

The days of a fixed network edge are gone. Digital transformation, cloud computing, Bring Your Own Device (BYOD) and the Internet of Things (IoT) have fragmented the traditional government network, making it nearly impossible to determine where an agency鈥檚 actual perimeter lies. Government systems have grown so complex that they have created an 鈥渆verywhere perimeter,鈥 including physical objects, cyber assets and network configurations, all of which must be properly secured.

Security is a constant battle for government organizations. Agencies need to safeguard critical applications and information, contain breaches and isolate hackers, as well as manage and secure IoT, while simultaneously meeting a myriad of compliance and regulatory obligations. So, how do agencies safeguard their 鈥渆verywhere perimeter鈥?

Join us on July 27 for a live webcast on why a 鈥淭hree-Prong Approach to Security鈥 is necessary in today鈥檚 ever-changing technology landscape. You will learn how this approach seamlessly connects physical, network and cyber systems, and understand why each component plays a vital role in a comprehensive security strategy.

The link to the recorded webcast is: 聽聽

This webcast will discuss:

  • Challenges that agencies face when protecting multiple security vectors
  • Three components of an effective security strategy
  • How to secure physical systems to prevent backdoor attacks
  • Key areas of focus for countering cybersecurity attacks
  • Best practices to consider when combining physical, network and cyber security
  • And more鈥

鈥︹赌︹赌︹赌.

Various technology manufacturers as well as government employees will be in attendance. Our audience will be interested in hearing the panel鈥檚 thoughts and experiences regarding top of mind priorities, challenges, and best practices in an effort to better their cyber security initiatives within an agency.