Defending Cyber Borders – Beyond the Virtual Maginot Line
The Maginot Line, a massive fortification built to defend the French-German border, was enormous and expensive – and ultimately – utterly ineffectual. The Germans simply flanked the barrier and invaded France. Today, the Line has become synonymous with a well-meaning, but shortsighted strategy that eventually fails.

As your agency spends time and money to defend its cyber borders, how will you ensure your organization avoids a similar fate by relying solely on a deep perimeter to prevent digital breaches?

Join us on October 25th as experts from across government, industry and leading analysts gather to discuss ground-breaking cybersecurity strategies, technologies, and how to make the most of your security investments. Benefit from key insights extracted from our analyst’s industry surveys and in-depth research. These leading cyber warriors will also share opinions and insights on:
  • Defending against a cyber Blitzkrieg: successful strategies for detection, prevention and effective responses to the dynamic threat landscape
  • How – and why - the modern day cybersecurity perimeter must evolve
  • Balancing cost with effectiveness: what to expect from your security investment
  • From the cyber frontlines: practical use cases and lessons learned
Learn and participate in this interactive video discussion as we explore ways you can build an effective, cost-conscious security strategy and avoid the cyber equivalent of the Maginot Line.

When you register and attend, you will have complimentary access to downloads and research, live Q&A chat with our online experts, and more.

Register today even if you can't attend on October 25, because you'll automatically have access to the on-demand version of the virtual event, and to all of the content.

Registration is required to attend this event. Please register now.

 If you have previously registered for this event, please login below:

First Name:*
Last Name:*
Job Title:*

You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
Please enable Cookies in your browser before registering for the webcast.
*Denotes required.
Cisco Systems, Inc. Privacy Policy

© 1992-2010 Cisco Systems Inc. All rights reserved.
Test Your System   |   Terms & Conditions    |    Privacy Statement    |   Cookie Policy   |  Trademarks of Cisco Systems, Inc.