Validate cyber security posture and combatting RaaS with BAS!

Logo
Presented by

Bharath Sathyanarayan, Sr. Solutions Engineer(SAP), Networks & Security, Keysight Technologies

About this talk

When you hear the words "Threat Intelligence", what's the first thing that comes to mind? Back-end research? Threat Hunting? It's easy to categorize threat intelligence as a reactive tool - best suited for things like root-cause analysis - but it's so much more than that. In this webinar you will learn how organizations from all industry verticals use Breach and Attack Simulation (BAS) to accurately assess their security risk, identify misconfigurations, and reveal the gaps that need fixing to optimize the security and robustness of its networks: • Operationalize MITRE ATT&CK as part of your security program. • Join us to discover how applying threat intelligence can help you • Answer the question "Am I more secure today than I was yesterday?" • Reduce your attack surface by blocking the latest threats • Maximize your threat hunting capability with real-time insights into botnets, phishing, etc. • Stay ahead of attackers by researching the latest attack signatures Presenter: Bharath Sathyanarayan, Sr. Solutions Engineer(SAP), Networks & Security, Keysight Technologies Moderator: Victor Yeo, CISSP, President (ISC)² Singapore Chapter
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (469)
Subscribers (75963)
Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.