Es importante recordar que la gestión del riesgo contri....
CASE STUDY: How to Defend the Compromised Network?
Designing and securing a network is very complex. With detailed requirements to support all of the latest devices, mobile computing, cloud services and the portability requirements of data, current networks are very porous, very difficult to secure and very compromised. What can we do to change that?
Main points covered:
- What are some of the most efficient ways to defend compromised networks?
- How to conduct threat hunting?
- What can we do when we are compromised by a threat?
Presenter:
Our special presenter for this webinar is Dr. Eric Cole, who has worked with a variety of clients, ranging from Fortune 500 companies to top international banks, to the CIA. He has presented at many security events, including SANS, and has also been interviewed by several chief media outlets, such as CNN, CBS News and 60 Minutes. In addition, he has been published in the Wall Street Journal, The New Yorker and IEEE Security and Privacy.
Organizer: Ardian Berisha
Date: July 12, 2017
Link of the recorded webinar on YouTube:
Slides of the webinar: