Protecting Your Assets: Assessing Your Vulnerabilities

Logo
Presented by

Tyler Booker and Aaron Scurlock

About this talk

This session will review the steps to protecting your assets within your environment. We will review the following: - Asset management and inventory ranking. - Open web application security project - Social engineering with respect to assets and data theft - Patch management and change management - Assessing risk within your environment - Penetration testing and vulnerability management

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (99)
Subscribers (1059)
Our mission is to enable small and midsized organizations to achieve their business objectives through information technology. To do that, our customers need a trusted IT ally with a wide and deep bench of IT talent with expertise in emerging and critical technologies such as cloud, cybersecurity, Office 365, mobility, and how the modern workplace operates. A trusted IT ally that can deliver reliability and operational excellence at an affordable price. A trusted IT ally like Logically.