InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Cloud Native Security Summit 2021 - Hacking Failure: Resilience

Presented by

David Sparks - CISO Series, Nick Espinosa - Security Fanatics, Will Gregorian - Color, Naomi Buckwalter - Confidential

About this talk

In the face of an ever-transforming digital world, resilience has become an essential focus for the security industry (reinforced even more so by a global pandemic and entirely remote workforces). With external attacks now accepted as an inevitable reality, how an organization detects, responds, recovers, and learns from a crisis is key. An effective cyber resilience program should include a programmatic approach to withstand disruptive cyber incidents. It should ensure continuity of operation with minimum impact to business despite an incident. It should also have a governance framework with policies, procedures, and accountability, integrated into the business strategy. This all needs to be powered by the right people and the right technology. It is an iterative process providing the means of recovery from an attack and the first step is accepting potential failure in the first place. What are some of the steps that organizations have taken to build cyber resilience programs and what have they learned when faced with failure?
Capsule8

Capsule8

1113 subscribers13 talks
Secure Production, Avoid Disruption
Capsule8 provides modern enterprises scalable Linux workload protection. The pioneer behind “ops-friendly” Linux security, Capsule8 Protect is purpose-built to deliver monitoring, detection and response with a single agent that can be deployed across heterogenous production environments. By using Capsule8, security teams have the visibility needed to detect incidents and protect against unwanted behavior, allowing them reduce downtime and avoid costly business disruption.
Related topics