What level are you?
What level are you? How mature is your organization when it comes to cyber security? Find out at our Booth (C123) at InfoSecurity/Data and Cloud Expo 2018!
Through our Security Maturity Assessment, you will get a clear view of which improvements to your cyber security operations should be prioritized and why. It will help you create an actionable cyber security strategy for the coming years. More info on this page soon!
End users that register before February 23d are entitled to a VIP ticket.
Our solution experts Bob Deleeck and Tom Fonteyn will elaborate on two important trends during their presentations:
Why the (Virtual) Secure Workspace is an essential part of your Data Security strategy, and how to convert to it.
By Bob Deleeck, Secure Workspace Business Developer at SecureLink
Place to be: Theater 4 | 10:15-10:45 | March 14 & 15
Because of the enforcement of GDPR regulations later this year, we need to be more aware of the value of our data and how to protect it. We tend to centralise more and more data into datacentres. In consequence, we see the convergence of security in the following domains: Infrastructure Security, Perimeter Security, Workspace Security, Cloud Security. During this presentation, we will address the impact of security convergence for your users, why a (Virtual) Secure Workspace is essential and how you can convert your workspaces and applications to it.
Effective Security Controls for the Cloud Perimeter
By Tom Fonteyn, Secure Cloud Business Developer at SecureLink
Place to be: Theater 4 | 12:30-13:00 | March 14 & 15
The adoption of cloud technology is no longer in its infancy. Nowadays, we must make sure to keep our security posture on par with the risks this new platform brings. During this session, I will show you how to design your cloud infrastructure from scratch with the right security controls in place.
So, bring your colleague(s) – but make sure they REGISTER AS A VIP as well – and pop in!