Securing Remote Access to Mission-Critical Devices and Network Segments

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Retailers, financial institutions, government agencies and other enterprises are taxed with providing staff and trusted third parties access to servers and equipment on production networks, but cannot afford to expose these devices or the data they process.

In this webinar, we will look at how enterprises are enabling secure remote access to mission-critical data and applications, whilst mitigating the risk of exposure to brute force and other network attacks. Panellists will consider the steps that enterprises can take to make sure that access does not translate into risk.

Key takeaways:

  • How to enable remote access to your business safely and securely
  • Where your ‘crown jewels’ are, and what measures you need to protect and enable access to them
  • What the regulatory and compliance questions are on remote access to mission-critical segments

Speakers

Photo of Sam Heiney

Sam Heiney

Director of Global Product Solutions, Netop

Photo of Matt McKeever

Matt McKeever

VP and CISO, LexisNexis

Photo of Ben Tomhave

Ben Tomhave

Cybersecurity Consultant

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Netop here: https://www.imperosoftware.com/privacy/. Please see Infosecurity Magazine’s privacy policy for more information.