Registration Page

     First Name:
     Last Name:
     Title:
     Company:
     Address:
     Dept/BOX/ MS:
     City:
     State/Prov:
     Zip/Postal Code:
     Country:
     Email:
     Phone: - -
     Fax: - -
     Company URL:

 
Do you have a budgeted security project?
 
Register Now
Featured Speakers:
 
  • Brian Czarny,  VP of Solutions Marketing, Webroot
     
  • Curtis Franklin,  Contributing Editor, Dark Reading
     

    Webroot Privacy Policy


    Bookmark and Share

     
    An InformationWeek Webcast:
    Safety in the Network Neighborhood: Protecting Enterprise Assets from Social Networking Threats


    Untitled Document

    Duration: One Hour

    By the numbers...

    • Only 12% of IT managers are aware of the potential dangers posed by Web 2.01
    • 75% of IT managers feel pressured to allow more access to Web 2.0 sites2
    • 50% of IT professionals are putting plans for collaboration tools such as social networking sites and IM on hold over security concerns3
    • Malware spread via social networking sites successfully infect 10 times more than email4

    Of all the network security threats, one of the most challenging to secure against is malware attacks originating from social networking sites, particularly as organizations begin to use social networking and other Web 2.0 sites for business purposes.  Organizations must now reconcile how to enforce Web 2.0 acceptable use policies for their users with the need to secure users from the growing number of web based malware threats.  This becomes increasingly difficult as the workforce grows more mobile and users begin to use company issued laptops to access the Internet and other internal networks from home and other remote locations.

    Join this informative Webinar hosted by Dark Reading contributing editor Curtis Franklin and Brian Czarny, VP of Solutions Marketing for Webroot as they discuss the trends, impact and methods to solve this growing problem.

    Agenda will include:

    • Reviewing the state of security, the trends and demands driving organizations to find innovative new ways to protect their networks
    • Why and how 2.0 websites have become a breeding ground for malware
    • Methodologies to protect against Web-borne threats
    • A review of Webroot Web Security including its ability to enforce acceptable use policies and to protect users. 

    Register and Attend this web seminar and you'll also receive a complimentary copy of “How bad are the bad guys” by analysts FreeForm Dynamics. This in-depth paper describes the changing nature of Web security threats’ and considers the way in which Web-based attacks are evolving, to target mobile users and take advantage of all forms of remote access; including coming in via social media sites.

    1-3. SC Magazine UK
    4. Information-Security-Resources.com

     



     
     
    UBM Tech - 600 Community Drive, Manhasset, New York 11030 - Privacy Statement