Keysight #3 - Don’t be a Victim of the Breach: Embrace the Hacker Within & Win!

Logo
Presented by

Steve McGregory, Sen Dir., Application and Threat Intelligence, Keysight; Brandon Dunlap, Moderator

About this talk

The hackers have automated their attacks, which gives them quite an upper hand. You, on the other hand, work at the pace and capability of your team and have to trust the products you’ve installed to defend your network. It’s time you utilize Breach and Attack Simulation and the emerging method of safely automating example attacks being used by the hackers to assess your deployed products, processes, and people. In this webcast you’ll learn how to hack yourself now and gain a new level of insight that will prepare you unlike ever before. We will examine what breach and attack simulation is, how automation and continuous assessment can show the current state of your defenses and how to find existing gaps in your security posture.
Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (445)
Subscribers (138646)
ISC2 Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.