Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA Bluegrass Chapter Quarterly Meeting
Tell a Friend About This EventTell a Friend
 

Jeff Malone, Director of Enterprise Sales, Trusteer, will give a presentation on "Protecting the Endpoints from Malware."

5/21/2013
When: 5/21/2013
5:30 PM
Where: ITT Technical Institute
2473 Fortune Drive Suite 180
Lexington, Kentucky  40509
United States

« Go to Upcoming Event List  

ISSA Bluegrass Chapter Quarterly Meeting - May 21, 2013

5:30 pm - 7:00 pm
Location: ITT Technical Institute, 2473 Fortune Drive, Suite 180 , Lexington, KY 40509

Speaker:
Jeff Malone, Director of Enterprise Sales,Trusteer
Topic: Protecting the Endpoints from Malware

Speaker Bio: Jeff Malone currently works for Trusteer and has significant information security experience. He co-founded an Atlanta based security VAR in the late 80’s. That company was the first to resell RSA(Security Dynamics, back then), a Charter member of the Citrix Platinum Group, and in the top 5 World Wide in sales, an early reseller of Checkpoint(pre-IPO in 1996), and many others including CipherTrust, Netscreen(Juniper) and others prior to being acquired by Forsythe, a Billion dollar/year VAR in Chicago. With this unique experience, he has seen many new technologies in the information security space.

Company Info: Trusteer is the Global leader in the Financial space of Anti-malware prevention. Founded in 2006, Boston-based Trusteer is the Global leader of endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breaches. Current solutions (AV, network malware-detection) are not enough. Trusteer delivers advanced malware protection to both managed and unmanaged devices within an organization including desktops, laptops, remote access devices, VPN connected devices and virtual desktops. New threats require a new approach.

The majority of malware infections are a direct result of exploitation of known and zero-day vulnerabilities. Cybercriminals continuously develop new exploits that take advantage of application vulnerabilities, to introduce malware and compromise endpoints. Once compromised, cybercriminals gain full control over the endpoint, which enables them to get further access to enterprise data and network resources.

Click here to register for this event.

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

9/29/2016
Healthcare SIG Webinar: Use of Cloud Services in the Healthcare Industry

10/6/2016
WOMEN CYBER SECURITY PROFESSIONALS LUNCH AND LEARN

10/7/2016
2016 Cyber Security Conference - Cyber Threat Intelligence

10/11/2016
SANS/ISSA Women's CONNECT Event




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information