Thwart off Application-Based Security Exploits: Protect Against Zero-Day Attacks, Malware, Advanced Persistent Threats
Mr. Power is the chief information officer for Lathrop & Gage LLP. He is responsible for aligning the technology direction of the firm with its strategic plan. He oversees all aspects of the technology services and resources at the firm.
Previously serving in the role of IT manager responsible for Infrastructure and Security, Mr. Power led the reengineering of the firm’s network, data and security infrastructure and developed the firm’s ongoing IT security practices and procedures to ensure the integrity and protection of client data.
Mr. Power is an active volunteer in the legal technology community and is serving his 3rd year as committee member for the annual International Legal Technology Association conference. He was a recipient of an ILTA Distinguished Peer Award in 2011 for the area of server/operations.
Mr. Power received his master’s degree in technology from the Durban Institute of Technology in South Africa.
Formerly Alex worked as the Director of Technology at CA and was responsible for implementing high availability products for Fortune 500 accounts. Prior to that, he served as VP of Engineering at Merrill Lynch’s global financial markets, where he was primarily responsible for the Windows platform strategy.
Mr. Shoykhet has more than 15 years of experience in the high-tech software and financial markets and infrastructure technologies with a keen understanding of business requirements.
Mr. Shoykhet graduated with a BS in Computer Information Systems from City University of New York, Baruch College.
A great danger exists if administrative rights are allowed in a whitelisting model: users that retain administrative rights may attempt to bypass or uninstall application control agents, and attackers may target the whitelisting mechanism to get bad code recognized as legitimate.
Join our featured speaker, Sean Power, CIO of a prominent law firm, in this interactive webinar to learn how you can:
- Explore the use cases for whitelisting and the removal of administrative rights.
- Leverage an ideal solution that removes admin rights and sets up an application control framework that allows approved applications.
- Protect against sophisticated zero-day attacks, malware, advanced persistent threats and other application-based exploits.
- Utilize an automated whitelisting product that reduces the amount of time IT must spend managing the whitelist profile.
Register for this webcast now to learn how you can close a dangerous security loophole and add a fortified level of security against advanced persistent threats.
All attendees will receive the whitepaper Layers of Cyber Security: Modern Security Threats By Leonid Shtilman.