Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

SS B02: Intel: Information at Risk: Proven Strategies to Avoid Breaches Using Solutions from Intel and Symantec

Created: 11 May 2012 • Updated: 22 May 2012
LeslieMiller's picture
0 0 Votes
Login to vote

Learn practical ‘best practice’ approaches using technologies from Intel and Symantec to build, strengthen and evolve your privacy & security practice to stay ahead of a rapidly changing threat landscape. This includes a proactive, preventative approach, examining emerging trends, and associated risks. In this holistic approach, practical risk assessments are used to prioritize the allocation of limited budget in a measured response to privacy & security that identifies administrative, physical and technical controls to effectively mitigate risks as part of a multi-layered and defense-in-depth approach. The impact on user experience and compliance is discussed, along with strategies to maximize the performance of technical security safeguards using hardware enabled security. Concepts presented are applicable across all industries, and will be illustrated with healthcare examples. Key take-aways from this class include:

  • Trends that are driving privacy & security risk going forward
  • A top-down, proactive, preventative and holistic approach, with practical risk assessments
  • How to implement a robust privacy & security practice with a multi-layered and defense-in-depth approach using hardware enabled security
  • Providing great performance of safeguards, a seamless user experience, and enabling improved compliance

Technologies Discussed:

  • Intel Anti Theft Technology
  • Intel Identity Protection Technology with Symantec Validation Identity Protection and Managed PKI

Presenter: David Houlding and John Williams