Learn with and from Virsec through our virtual and in-person events.
Securing Software at Runtime: The Real Story
In order to secure your software while it’s running, you must first understand it. Join Jim Routh, CISO veteran and industry expert, and Dave Furneaux, CEO of Virsec, to learn how.
There is confusion in the cyber world today about “runtime protection.” Many vendors mentioning runtime protection really mean that they are spotting malicious activity after it has taken place and are taking steps to contain and remediate an exploit after the fact. In this webinar, Jim Routh and Dave Furneaux will discuss:
- Limitations of machine learning, artificial intelligence, in protecting software at runtime
- The importance of protecting software workloads from the inside in a way that allows an attacker zero dwell time
- How to create a dynamic golden image of your software that shows exactly what it is doing – and how to use Virsec Security Platform to stop malicious activity before it startsIt’s time to stop cyber attacks on software for good.
Dave Furneaux has been a driving force behind Virsec since its inception, as an investor and active board member, becoming CEO in 2020. He has spent his 30-year career as an entrepreneur and venture investor, forming, building and investing in numerous high growth companies in information technology, including successful cybersecurity companies, Watchfire (acquired by IBM), Skystone (acquired by Cisco), Application Security (acquired by Symantec) and Aironet (acquired by Cisco).
Jim Routh is a cybersecurity expert focused on applying risk management disciplines to converged security functions within global enterprises. A pioneer in applying robust security controls to allow leading brands to deliver world-class level security capabilities, he formerly served as the CISO for MassMutual, the CSO at Aetna, and the Global Head of Application and Mobile Security for JP Morgan Chase. He also was the CISO for KPMG, DTCC, and American Express and has more than 30 years of experience in information technology and information security as a practitioner, management consultant, and leader of technology, analytic, and information security functions for global firms.