The Necessity for a Behavior Security Approach to Finding & Fixing Blindspots

Logo
Presented by

Pratik Roychowdhury, CPO, Mesh7

About this talk

So you've deployed your cloud-native application in production. And you've put in place network policies and security & compliance solutions to ensure that your applications are protected and compliant. What if I told you that your data might still be leaking out? What if your applications are still talking to unsanctioned domains and CnC sites? What if your use of cloud services are getting compromised? What if rogue insiders with access to credentials are misusing your environment or stealing info? What if I told you that you still have a number of risky security holes and blind-spots in your environment that you are not aware of? This session talks about the effective strategies -- of how to detect and mitigate against intrusions and risks from lateral breaches, egress breaches, cloud services breaches, in your environment and how to mitigate them -- so you can focus on productivity and business continuity.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198883)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.