How to secure budget and every layer of your IT environment

Presented by

Trevor Christiansen, Sr. Web Application Pentester at Rapid7, Brian Carey, Consulting Services Manager at Rapid7

About this talk

The bad guys will utilize any vulnerabilities to gain access to your data. Countering their attacks requires proactive protection of your IT environment with activities such as patching known vulnerabilities, performing vulnerability scanning, and penetration testing.
Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (562)
Subscribers (46278)
Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure to the dark web. We foster open source communities and cutting-edge research–using these insights to optimize our products and arm the global security community with the latest in attackers methods. Trusted by more than 10,000 customers worldwide, our industry-leading solutions and services help businesses stay ahead of attackers, ahead of the competition, and future-ready for what’s next.