Shrink the Attack Surface

Logo
Presented by

Katie Teitler, Senior Cybersecurity Strategist, Axonius

About this talk

Discovering all of your assets — devices, cloud services, software and users — is essential to secure your organization's environment. But it can be a struggle to identify, manage, and control the complexity that comes with these environments. Without understanding what's happening and knowing what you assets you have, there's the potential risks with external threats, vulnerabilities, shadow IT, and cloud misconfigurations. So how can you can practice Attack Surface Management, while you stay proactive? Join this session for a new perspective on: • How your existing technology can work together to discover all of your digital assets • What techniques you can use for identifying, categorizing, and normalizing digital assets • How you can use an asset inventory to identify external threats, misconfigurations, shadow IT, and policy violations • Where to use automation to continuously assess your assets for threats
Related topics:

More from this channel

Upcoming talks (5)
On-demand talks (330)
Subscribers (34067)
ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.