Did you know that as a valued customer, you have exclusive access to on-premises detection and response services, provided only by Trend in the cyber security space? Discover how we can provide unparalleled coverage for your on-premises infrastructure and enhance your security measures in our upcoming live session. Join us to explore these vital topics, discover the benefits of our products, and gain the knowledge needed to make informed decisions that keep your organization secure. This live session is your opportunity to stay ahead in the ever-changing cyber security landscape.
Key Topics to be Covered:
Registration has closed for this event.
Trend Micro guards your privacy: Read our privacy policy.
Section 1 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 1 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Presented by:
Kate Muckenthaler
Platform Specialist
Falling in love with customer pain points since 2015.
Tom Bouathong
Principle Engineer
Tom Bouathong has worked in the cybersecurity space for many years. His role is to assist customers achieve their security goals within Trend Micro as well as different core technologies.
n/a
n/A
Jon Clay has worked in the cybersecurity space for over 24 years. He is responsible for managing marketing messages and external publication of all threat research and intelligence within Trend Micro as well as different core technologies. As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats.
Section 2 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.