Event details
Sponsored by:
About this webinar:
As cyber threats continue increase in frequency and complexity, compounded by remote working and ever evolving infrastructure estates, IT leaders must constantly assess whether their security stack is fit for purpose. However, past Computing research tells us there is often an incumbency bias amongst decision makers when it comes to their security solutions – a worrying ‘if it ain’t broke, don’t fix it’ mentality. Of course, if it does break, the damage may well already be done.
Modern enterprises in the post pandemic world must also rapidly execute software innovations to their digital customer-facing services to remain competitive – or face losing business. This pressure drives a temptation to move at speed, often at the expense of effective security. At the same time, supply chain security challenges are increasing through additional entry points into the business by doing business with more partners than ever.
In this computing web seminar, we reveal enterprises’ biggest challenges when it comes to application security, and discuss best practise for mitigating risks – including network security and application vulnerability testing, and threat intelligence. We’ll also answer key questions around making the most of a limited cyber security budget by strengthening your existing tools.
Panel
Stuart Sumner
Editorial Director, Enterprise IT
Stuart Sumner is Editorial Director of Incisive Media's technology-focused titles: Computing and Delta. He oversees all content across print, web, tablet editions, rich media and events - including the IT Leaders' Dining Club and Computing Summits. During Stuart's tenure Computing has transformed from a print-reliant business to a bleeding edge multi-channel brand with an industry-leading events portfolio. Previously he spent 10 years as a programme manager in the IT industry, working for companies such as the BBC, COLT, Nortel Networks and Equant. As a journalist he has also worked for Time Out and IPC Media. He is a regular technology pundit and contributor to the BBC News Channel, as well as a published author.
Scott Register
Vice President, Security Solutions
Scott Register has more than 15 years of experience leading product management and go-to-market activities for global technology companies and is currently vice president of security solutions for Keysight where he is tasked with brining new security solutions to market across Keysight’s broad solution portfolio.
Prior his current role, Scott was vice president of product management leading the development of new Ixia products in the areas of Security, Virtualization and Cloud. Earlier, Scott spearheaded the company’s visibility product line.
Scott brings Keysight broad experience in managing enviable growth across a diverse range of environments, from embryonic to VC-backed startup to multi-hundred-million-dollar product lines. Innovative and energetic, Scott has a strong history of successful engagements with customers, channels, and business partners on a global basis.
Prior to Ixia, he led product management at BreakingPoint Systems where he was responsible for the industry's highest rated network performance, security, and resiliency testing equipment, before the company was acquired by Ixia.
Scott previously led product lines for Blue Coat, where he oversaw the successful launch of a new appliance suite designed specifically for low touch, rapid sales opportunities. At Check Point Software he managed all aspects of FireWall-1 product and a suite of supporting products including software management, load balancing, and intrusion protection systems.
Ellen Daniel
Tech Analyst, Computing
Ellen is an experienced technology journalist who recently joined Incisive Media as a technology content editor from business and technology title Verdict where she was a senior reporter. Ellen works with our technology research team producing reports on the latest industry trends.
Rob Pocock
Technical Director at Phoenix Datacom
Rob is trusted by Security Leaders in many household names to help them build resilience and continuous improvement to their security and monitoring capabilities. A typical day for Rob can include: advising C-Level Execs around addressing the latest threat vectors targeting their industry, finding the real-world performance envelope of Security solutions Vs datasheet claims, and training our Cyber Security Apprentices to replicate customer environments and demonstrate Security Tools in context to their unique scenarios.
Share
Register