Keeping Things Safe: Device and System Protection

Episode-X---Keeping-things-safe--device-and-system-protection.jpg

Theme: Cybersecurity Basics | Prevention

#10 | Keeping Things Safe: Device and System Protection
#11 | Access Control Basics: Password Management and Authentication
#12 | Keeping Communications Safe: Networking and Wi-Fi


A Cybersecurity Webinar For SMBs | Episode X

Regardless of how your business is run, it’s a given that there are a number of laptops, desktops, servers, and even mobile devices used as part of your business processes. Understanding how these endpoints fit in to the grand scheme of things can help you optimize your IT and security management programs to manage risk and increase productivity.

Join experts in the field for this need-to-know webcast to learn best practices around:

Managing Risk and Weaknesses at the Endpoint
Managing Access to the Endpoints
Managing Data on the Endpoints
Managed Endpoint Connections to Systems, Applications, and Data

 

STAY TUNED FOR THE RECORDED SESSION

This video qualifies for 1 CPE. Learn more.

Offical+ISC2+CPE+credits+Submitter+V2.jpg

Video coming soon…

On The Go? Have A Podcast...

Coming soon…



Educators

Lost-in-Space.png

TBA

TBD

TBD

James-Stanger.png

TBA

TBD

TBD

Lost-in-Space.png

TBA

TBD

TBD


Moderator

 
 

Sean Martin, CISSP

Editor-in-Chief
ITSPmagazine

 

This webcast is part of a series of SMB cybersecurity webcasts on ITSPmagazine.
Sign up for the newsletter to get notified of future events.