Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA Bluegrass Chapter Quarterly Meeting
Tell a Friend About This EventTell a Friend
 

Jeff Malone, Director of Enterprise Sales, Trusteer, will give a presentation on "Protecting the Endpoints from Malware."

5/21/2013
When: 5/21/2013
5:30 PM
Where: ITT Technical Institute
2473 Fortune Drive Suite 180
Lexington, Kentucky  40509
United States

« Go to Upcoming Event List  

ISSA Bluegrass Chapter Quarterly Meeting - May 21, 2013

5:30 pm - 7:00 pm
Location: ITT Technical Institute, 2473 Fortune Drive, Suite 180 , Lexington, KY 40509

Speaker:
Jeff Malone, Director of Enterprise Sales,Trusteer
Topic: Protecting the Endpoints from Malware

Speaker Bio: Jeff Malone currently works for Trusteer and has significant information security experience. He co-founded an Atlanta based security VAR in the late 80’s. That company was the first to resell RSA(Security Dynamics, back then), a Charter member of the Citrix Platinum Group, and in the top 5 World Wide in sales, an early reseller of Checkpoint(pre-IPO in 1996), and many others including CipherTrust, Netscreen(Juniper) and others prior to being acquired by Forsythe, a Billion dollar/year VAR in Chicago. With this unique experience, he has seen many new technologies in the information security space.

Company Info: Trusteer is the Global leader in the Financial space of Anti-malware prevention. Founded in 2006, Boston-based Trusteer is the Global leader of endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breaches. Current solutions (AV, network malware-detection) are not enough. Trusteer delivers advanced malware protection to both managed and unmanaged devices within an organization including desktops, laptops, remote access devices, VPN connected devices and virtual desktops. New threats require a new approach.

The majority of malware infections are a direct result of exploitation of known and zero-day vulnerabilities. Cybercriminals continuously develop new exploits that take advantage of application vulnerabilities, to introduce malware and compromise endpoints. Once compromised, cybercriminals gain full control over the endpoint, which enables them to get further access to enterprise data and network resources.

Click here to register for this event.

Community Search
Sign In


Forgot your password?

Haven't registered yet?

Calendar

1/19/2017
ISSA Pre-Professional Virtual Meet-Up: Future Challenges: Are You Ready?

1/24/2017
International Web Conference - 2016 Review and 2017 Predictions

2/9/2017
CISO Mentoring Webinar Series: What It Takes to be a CISO in 2017

2/11/2017 » 2/12/2017
ISSA CISO Executive Forum - Feb. 2017, San Francisco, CA

2/13/2017 » 2/17/2017
RSA® Conference 2017




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information