Six Endpoint Security Practices Every Business Must Address
Explore Critical Focus Areas to Ensure Your Future Cyber Security Strategies are Successful
An Industry Expert Led Webcast and In-person Panel Discussion Series
April 26th, 2018 @ 3:30 PM EDT
Best Practices For Your Cyber Security Strategies
You are invited to a cutting edge live in-person panel discussion and webcast that will help you define future strategies around your company’s Cyber Security.
Our panelists will highlight key information you need to know, and share their expertise regarding:
At this limited availability event, you will learn:
- How to be protect your organization, mitigate legal risk and prevent cyber-attacks from compromising your environment;
- The legal and financial liability your company faces if you do not eliminate your Cyber Security threats and prevent future attacks; and
- Best practices to a proactive security model to inoculate your information technology ecosystem and prevent attacks before they occur.
Event Information:
How: | Live In-person Panel Discussion
Webcast |
When: | April 26th, 2018 3:30 – 5:30 PM Eastern |
Where: | DLA Piper – Boston 33 Arch Street 26th Floor Boston, Massachusetts 02110-1447 Go-To-Webinar Simulcast |
Once registered, we will send you a confirmation email with the event details.
Webinar Registration
In-Person Panel Discussion Registration
Our Expert Panel

John Murgo
John is a successful executive/entrepreneur in the CyberSecurity, Mobile App and other Enterprise Software industry expertise. Focused on businesses possessing disruptive technologies and business models to bring products to market.

Dom Glavach
Dom has extensive experience in cyber security disciplines such as cyberattack methods and countermeasures, digital forensics and incident response, advanced adversary tactics and mitigation, DNS and Internet services defenses, and safeguarding direct digital manufacturing machines.

Michael Hardgrove
Michael Hardgrove has provided international tax consulting, legal entity structuring and intangible property transaction services to numerous public and private companies with operations throughout the world.
Our Cyber Security Industry Sponsors
Digital Immunity is the only solution to protect trusted processes in memory at runtime preventing the execution of malware attacks before the damage is done while providing rich forensics in context.
“Cybersecurity is becoming one of the most challenging issues facing companies and consumers. In today’s interconnected world, virtually all companies and their customers are potential targets for cyberattacks.”
DLA Piper
“CyberSN is the first recruitment service that actually wanted to know me off paper. They truly care about finding a position to enhance your abilities and ensure you achieve a great work/life balance. This is what recruiting should be.”
Christopher, Security Analyst, Massachusetts
“Before deploying Digital Immunity I thought it would take weeks to map all 22,000 applications. I had visions of late nights, weekends and a lot of disruption. But I was wrong. It took only a matter of hours over one weekend for everything to me mapped and ready for protection. Better yet, the hours each week I was spending patching our systems against security leaks has been eliminated. I’ve gotten so much time back to focus on business imperatives.”
Nicole Woods – IDS