InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Assume Breached!

Presented by

Dan Vetrivanathan, APAC Customer Engineer, Mandiant, now a part of Google Cloud

About this talk

The best method for breach preparation is ASSUMED as opposed to the initial IF which then moved onto WHEN. Security teams should approach validation using a trusted actor methodology by simulating breaches as authorized users. This will identity business risks generated from security weaknesses, vulnerabilities and mis-configurations. The ultimate target is having the ability to assess the impact on organization's critical data and assets. Join this session to learn more about how to be best prepared for a breach, by managing your initial assumptions.
Mandiant APAC

Mandiant APAC

19444 subscribers70 talks
Make Google part of your security team
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.
Related topics