Scaling your IT to meet your current and future IT security needs

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Your organisation hopefully has an IT security system that meets your needs today, but what about in 12, 24 and 36 months time?

Security lifecycle planning is now, whether we like it or not, a key part of the IT security landscape, but experts on this increasingly important aspect of security are few and far between.

This webinar can help.

In just 60 minutes we hope to:

  • Explain how scalable security technology works
  • Help you understand the logistics and planning involved
  • Educate you on the issues that need to be tackled at all stages in
    developing a scalable IT security architecture for your firm
  • Assist you in planning for IT security change


This webinar is for:

  • IT managers wanting to understand more about scalable technology
  • IT security managers looking at their hardware and software options
  • Managers who want to learn more about scalable options


Speakers

Photo of Tom Davison

Tom Davison

EMEA Technical Director, Lookout Inc

Steve Gold

Infosecurity Magazine

Caroline Ikomi

Technical Director, Check Point Software Technologies

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.