Тёмный

Traditional Sessions - RSAC 365 Virtual Seminar: Infrastructure Security 

RSA Conference
Подписаться 94 тыс.
Просмотров 509
50% 1

Presenters:
Srinivasa Addepalli, CTO, Aryaka
Taharka Beamon, Global Security Operations Center (SOC) Manager, Reed Exhibitions
Dominique Calder, PhD Candidate, Cofounder, GMU, Novus Security
Session 1: Enhancing Security Investigations Using Digital Forensics from the Bottom Up
This discussion looks at the reality of enterprise growth, infrastructure security needs, and how to close the gap with digital forensics using a four-step methodology and help organizations assess their current security posture and evolve into a more mature organization that has security and proper response baked in from the start.
Session 2: Assessing Vendors and Partners and Influencing Secure Practices
A solution is only as secure as the sum of its parts. Modern architectures involve integration of software and technology provided by or controlled by external entities. Beyond auditing internal infrastructure, applications and security practices, it’s vital to assess vendors, partners, etc. Assessment results will provide confidence or an opportunity to influence preferred security improvements.
Session 3: The Hidden Risks of SASE/SSE: Why Configuration Matters for Zero Trust Security
In this talk, we explore the hidden risks of SASE/SSE, such as not leveraging the power of SASE, configuration complexity, and compliance issues, and how they can undermine the zero-trust security model. We also propose some best practices and recommendations for configuring and managing SASE/SSE solutions to achieve optimal security and performance.
www.rsaconfere...

Опубликовано:

 

8 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии    
Далее
The Price is WRONG - An Analysis of Security Complexity
49:42
Dropping In from the Clouds 🌁
00:17
Просмотров 669 тыс.
Fortinet SASE and Secure Container Live Demo
28:25
Просмотров 9 тыс.
SANS Webcast: Effective (Threat) Hunting Techniques
54:01
RSA Conference 2024 Opening Keynote
7:09
Просмотров 1 тыс.
Cybersecurity Architecture: Application Security
16:36
Zero Trust Explained | Real World Example
21:46
Просмотров 24 тыс.
What is a Zero Day Threat?
13:45
Просмотров 13 тыс.
Overview of Zero Trust Architectures
45:42
Просмотров 31 тыс.