Assume the Attackers Are Already Inside – Now What?

Presented by


About this talk

The SolarWinds attack exposed almost 20,000 of their customers. Attacks on Microsoft Exchange servers hit more than 30,000 businesses. In both cases, advanced attackers used remote code execution to open persistent back doors that will likely be exploited for years to come. We must assume that the precursors to the next data breach have bypassed perimeter defenses and are already inside our networks. It’s time to flip the security script and protect critical applications, workloads, and data in vulnerable environments. This requires applying a zero trust model during runtime to prevent applications from being hijacked or derailed, even when under attack. Join experts from Virsec for a discussion and demonstration of application-aware runtime protection, to proactively stop the next SolarWinds from becoming a data breach disaster.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (95)
Subscribers (4298)
Virsec is the industry leader of application-aware server workload protection. Learn how to improve and optimize your security posture, ensure real-time protection from today's most dangerous cyber threats and attacks, including memory corruption, fileless and zero-day attacks. Hear valuable insights from cybersecurity leaders, experts and influencers, vulnerability analysis and more.