EVENT DETAILS

[Webinar] How to Prevent Malicious Attacks with User Verification

 

Traditional enterprise security models were built around protecting a trusted, internal network from external threats. Data was safely contained within a clearly defined perimeter.

As businesses adopt more cloud-based systems and mobile working becomes commonplace, that perimeter has been radically redefined or indeed removed altogether.

Modern employees are often untethered, working outside office walls and connecting to work applications with personal devices and via different networks. Consequently, enterprises no longer have distinct boundaries.

This new era of technology presents new risks. Administrators of modern environments face different security challenges as they attempt to secure employees access to the new enterprise network.

Join Peter Wilson from IT Lab and George Vasey from Duo Security on Wednesday, Jan 31st at 10 am to learn:

  • What are the prevalent security risks and how to minimise them to secure your modern enterprise.
  • How ‘Trusted Access’ is an essential component of your organisation’s defences against a data breach.
  • A demonstration of Duo Security’s capabilities and how they ease the  user experience.

Keynote Speakers

panel member peter wilson

Peter Wilson

Head of Technology Consulting Services at IT Lab

Peter's role at IT Lab is to vet all tech designs for our clients and help them adopt and implement new technologies across all areas of their business.

 

George Vasey

George Vasey

Partner Manager, EMEA at Duo Security

George has over 5 years' experience in IT Security and is responsible for managing Duo's MSP partner relationships in EMEA. His role includes assisting partners with the communication of Duo's messaging and security best practices to customers.