Not All Threats are Created Equal

Nick Cavalancia, Founder/Chief, Techvangelism

Nick Cavalancia, Founder/Chief, Techvangelism

Nick Cavalancia has over 20 years of enterprise IT experience, 10 years as a tech marketing executive and is an accomplished technology writer, consultant, trainer, speaker, and columnist. Nick has attained industry certifications including MCNE, MCNI, MCSE and MCT and was once accused at TechEd of "not having enough digits" in his MCP number (which only has 5). He has authored, co-authored and contributed to over a dozen books on Windows, Active Directory, Exchange and other Microsoft technologies and has spoken at many technical conferences on a wide variety of topics. Previously, Nick has held executive marketing positions at ScriptLogic (acquired by Quest, now DELL Software), SpectorSoft and Netwrix where he was responsible for the global messaging, branding, lead generation and demand generation strategies to market technology solutions to an IT-centric customer base.

About this Webinar

Ransomware, threat kits, malware, spear phishing, and whaling are just a few of the ever present dangers that IT departments have to combat almost daily. And, somehow, with the count of new threats ranging from the hundreds of thousands into the millions, IT is expected to magically know what to be on the lookout for and be able to quickly respond.

Since you can’t hire an army of people, you must be smarter about which threats to tackle and in what order. How do you separate the really nasty threats – those that pose a high-risk to your business – from those that aren’t so menacing? And what should you do once you’ve identified them?

Want to make sense of it all? In this on-demand webinar, industry expert and founder of Techvangelism, Nick Cavalancia, as he breaks down today’s security challenges and provides some insights into how you can cut through the noise and pinpoint what’s most important. In this interactive session, Nick will discuss:

  • The current state of threats
  • The need to identify vulnerabilities, malware, and attacks
  • Where do reporting, analysis, and remediation fit in?