Print Page   |   Contact Us   |   Sign In   |   Register
ISSA Bluegrass Chapter Quarterly Meeting
Tell a Friend About This EventTell a Friend
 

Jeff Malone, Director of Enterprise Sales, Trusteer, will give a presentation on "Protecting the Endpoints from Malware."

5/21/2013
When: 5/21/2013
5:30 PM
Where: ITT Technical Institute
2473 Fortune Drive Suite 180
Lexington, Kentucky  40509
United States

« Go to Upcoming Event List  

ISSA Bluegrass Chapter Quarterly Meeting - May 21, 2013

5:30 pm - 7:00 pm
Location: ITT Technical Institute, 2473 Fortune Drive, Suite 180 , Lexington, KY 40509

Speaker:
Jeff Malone, Director of Enterprise Sales,Trusteer
Topic: Protecting the Endpoints from Malware

Speaker Bio: Jeff Malone currently works for Trusteer and has significant information security experience. He co-founded an Atlanta based security VAR in the late 80’s. That company was the first to resell RSA(Security Dynamics, back then), a Charter member of the Citrix Platinum Group, and in the top 5 World Wide in sales, an early reseller of Checkpoint(pre-IPO in 1996), and many others including CipherTrust, Netscreen(Juniper) and others prior to being acquired by Forsythe, a Billion dollar/year VAR in Chicago. With this unique experience, he has seen many new technologies in the information security space.

Company Info: Trusteer is the Global leader in the Financial space of Anti-malware prevention. Founded in 2006, Boston-based Trusteer is the Global leader of endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breaches. Current solutions (AV, network malware-detection) are not enough. Trusteer delivers advanced malware protection to both managed and unmanaged devices within an organization including desktops, laptops, remote access devices, VPN connected devices and virtual desktops. New threats require a new approach.

The majority of malware infections are a direct result of exploitation of known and zero-day vulnerabilities. Cybercriminals continuously develop new exploits that take advantage of application vulnerabilities, to introduce malware and compromise endpoints. Once compromised, cybercriminals gain full control over the endpoint, which enables them to get further access to enterprise data and network resources.

Click here to register for this event.

Community Search
Sign In
Sign In securely
Calendar

12/14/2017
ISSA Healthcare SIG 4th Quarter Webinar - Lessons Learned and Recovery from Breaches

12/15/2017
ISSA Financial SIG - 4th Quarter Webinar - Security Review and Predictions for FI

12/15/2017
Women’s Connect – ISSA Central MD, ISSA National Capital Region, ISSA NOVA

1/25/2018 » 1/26/2018
January CISO Forum Scottsdale 2018




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information