Combating professional security threats

Guest post by Kim Lock, Editor, IT Experts Community

 

When it comes to security breaches and threats, the question is “not if, but when”. Organizations now face daily onslaught from hacktivists, rogue governments and criminals. These are highly specialized criminals whose singular focus is to gain access to your private information and data and capitalize from it.

 

Join us at HP Discover and hear from Art Gilliland, Senior Vice President and General Manager, HP Enterprise Security Products during his keynote presentation. Gilliland will discuss the current security landscape, available defensive tools and his predictions for the future of security.

 

 

Understanding that an attack will happen at some point allows you to shift the way you view security. It is no longer acceptable to simply put information and data into a “lockbox” and hope that it is safe. You have to be proactive and anticipate your enemy’s next move.  You have to have specialized controls at every step in the attack process.

 

But sometimes predictions aren’t enough and your information is still compromised. You have to be prepared to clean up and re-secure your environment after an attack. Gilliland will discuss proven strategies to restore your organization after a breach occurs.

 

Join us at his presentation during HP Discover in Las Vegas on June 13, 2013, at 9:30 a.m. This promises to be a presentation that you won’t want to miss.

 

 

 

 

 

 

Discover2013.png

Comments
Cindy_Blake | ‎06-07-2013 01:17 PM

 

In addition to Art's keynote presentation, you will find a wealth of security content at HP Discover.  Check out the Security content map for a complete listing  http://www.hp.com/united-states/Content-map-Security.pdf

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
This account is for guest bloggers. The blog post will identify the blogger.


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation