Security managers are clearly being pulled in a few different directions. On the one hand, you're trying to meet strategic demands, such as complying with regulations, quantifying ROI and managing risk. On the other, you've got to protect against perennial threats, including fending off viruses and worms, and hardening the perimeter against external attacks. Technology's goal is often to automate as many of these duties as possible in order to enable you and your security team to tackle these more strategic imperatives.
This presentation helps you understand the evolution of the security vendor landscape with an eye toward promising security techniques and technologies for 2006. No one has his finger on the pulse of the security market like Pete Lindstrom, research director at Spire Security. In this presentation, Lindstrom investigates the latest academic research, information security best
Plan ahead for investing your smartest security budget in 2006 as Lindstrom delivers:
- A survey of existing tools and techniques
- New methods for combating threats, such as employing enclaves and virtualization
- Noteworthy enhancements to commonly used tools, including dynamic access control, honeypots and threat correlation
- New ideas for solving old problems like the use of context-based encryption and unified threat management
- A way to separate worthwhile approaches from vendor hype