Beware of rogue software. It is one of the biggest challenges in today’s IT environments and can silently destroy the integrity and security of an organization. Rogue software runs the gamut from unapproved software introduced from BYOD (Bring Your Own Device) policies to an approved operating system on a server that has passed its end-of-life (EOL) or end-of-support (EOS) dates. Being rogue, the software runs undetected in the enterprise, creating a security vulnerability for the entire organization. The vulnerability can lead to cyberattacks, unauthorized access, security breaches and more.

Join Gary Winkler, president at American Cyber, Inc., and former program executive officer for the Army’s PEO EIS, in this webinar as he shares his experience with eliminating the risk of rogue software in security. Steve Watkins, former editor of Federal Times, also joins Gary in this webinar.

Watch the webinar now.


Gary Winkler
President, American Cyber, Inc.

Steve Watkins
Former Editor, The Federal Times

Rogue Software – Eliminating the Risk and Impact on Security

Public clouds used/planning to use?
(Select all that apply)