- Published: November 2011
Conducting a Security Threat Assessment on Your Company's IT - Tips, Templates & Best Practices that Every CIO Should Incorporate
- Published: July 2011
- 60 pages
In Conducting a Security Threat Assessment on Your Company's IT, ExecSense examines easy-to-implement tips and best practices that leading CIOs are using to detect both active and potential threats that are evading their companies’ existing security measures. Take the 60 minutes to view this webinar (on your computer, mobile phone, iPad, Kindle or printed out) to learn how other CIOs are testing their company’s IT security, and what you should be doing to strengthen your organization’s existing security infrastructure against data-stealing malicious software threats that could evade detection.
Upon ordering, ExecSense will email you a link to download the webinar files for viewing on your computer, mobile phone, iPod, iPad, Kindle or printed out. The downloaded files will include the PowerPoint presentation, audio narration and jpeg images of the slides (for watching on your mobile media device). Take advantage of your next commute, flight, business trip, lunch, or free hour in your schedule to view this webinar.
The webinar is led by an expert on conducting security threat assessments, Sam Alapati, Ph.D. (Senior Technical Director, Miro Consulting, Inc.), and focuses on:
- Everything you need to know in 60 minutes about conducting security threat assessments in order to detect both active and potential threats that are evading your company’s existing security measures
- CIO tips and techniques for conducting a security threat assessment that reveals business risk meters, affected assets, threat statistics, infection sources, disruptive applications, and trends of threats/events within your company
- Answers to the ten questions most asked by CIOs about how they can conduct security threat assessments in order to prevent loss of confidential customer data, loss of intellectual property, regulatory violations, exposure to fines and litigation, and more
- Case studies of other CIOs that have protected their companies’ confidential data by using security threat assessments, what best practices they employed, and important lessons learned that you need to know about
Praise for ExecSense Webinars:
“Well organized, well articulated, and easy to follow. The ExecSense webinar I attended was the best virtual learning experience I've had in quite some time.” – Brian K. Moore, HR Communications, Humana
“Dynamic, up-to-date resource...” – Tina Ferguson, CEO of Rapid Success Partners
“ExecSense webinars are convenient and on-point…an intelligent discussion on a very relevant subject.” – Meghan Wulff, Focus Management Group
SHOW LESS READ MORE >