Print Page   |   Contact Us   |   Report Abuse   |   Sign In   |   Register
ISSA Bluegrass Chapter Quarterly Meeting
Tell a Friend About This EventTell a Friend

Jeff Malone, Director of Enterprise Sales, Trusteer, will give a presentation on "Protecting the Endpoints from Malware."

When: 5/21/2013
5:30 PM
Where: ITT Technical Institute
2473 Fortune Drive Suite 180
Lexington, Kentucky  40509
United States

« Go to Upcoming Event List  

ISSA Bluegrass Chapter Quarterly Meeting - May 21, 2013

5:30 pm - 7:00 pm
Location: ITT Technical Institute, 2473 Fortune Drive, Suite 180 , Lexington, KY 40509

Jeff Malone, Director of Enterprise Sales,Trusteer
Topic: Protecting the Endpoints from Malware

Speaker Bio: Jeff Malone currently works for Trusteer and has significant information security experience. He co-founded an Atlanta based security VAR in the late 80’s. That company was the first to resell RSA(Security Dynamics, back then), a Charter member of the Citrix Platinum Group, and in the top 5 World Wide in sales, an early reseller of Checkpoint(pre-IPO in 1996), and many others including CipherTrust, Netscreen(Juniper) and others prior to being acquired by Forsythe, a Billion dollar/year VAR in Chicago. With this unique experience, he has seen many new technologies in the information security space.

Company Info: Trusteer is the Global leader in the Financial space of Anti-malware prevention. Founded in 2006, Boston-based Trusteer is the Global leader of endpoint cybercrime prevention solutions that protect organizations against financial fraud and data breaches. Current solutions (AV, network malware-detection) are not enough. Trusteer delivers advanced malware protection to both managed and unmanaged devices within an organization including desktops, laptops, remote access devices, VPN connected devices and virtual desktops. New threats require a new approach.

The majority of malware infections are a direct result of exploitation of known and zero-day vulnerabilities. Cybercriminals continuously develop new exploits that take advantage of application vulnerabilities, to introduce malware and compromise endpoints. Once compromised, cybercriminals gain full control over the endpoint, which enables them to get further access to enterprise data and network resources.

Click here to register for this event.

Community Search
Sign In

Forgot your password?

Haven't registered yet?


ISSA International Conference Preview: Computer Science Curricula’s Failure

ISSA Web Conference: How to Recruit and Retain Cyber-Security Professionals

Chapter Leaders Summit

11/2/2016 » 11/3/2016
2016 ISSA International Conference Registration

11/2/2016 » 11/3/2016
2016 ISSA International Conference

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information