Navigating a post-compromise reality

Logo
Presented by

John Matthews, Chief Information Officer Extrahop Networks

About this talk

Every organization gets compromised - it's how fast you detect and respond that counts. Trends like the overnight move to remote work and the subsequent increase in phishing attacks, the acceleration of cloud adoption, and proliferation of enterprise IoT have expanded the attack surface and complicated the job of security professionals. We'll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or incident from becoming a full-scale data breach. *Introduction music by: Bensounds.com

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (884)
Subscribers (55230)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa