How to Identify and Prioritise Attack Paths and Prevent their Exploitation

Presented by

Bernard Montel - Technical Director & Security Strategist EMEA, Tenable

About this talk

The digital transformation has affected all sectors: automotive, industry, banking, health, and since the pandemic the education sector has been transformed, not to mention remote working. From the industrial network to the cloud, the attack surface has become fragmented, and hacker groups have become more and more agile in exploiting vulnerabilities that have often been present for many months. Finding attack paths before they are exploited across the entire attack surface is changing our approach to vulnerability management. Companies need to identify critical assets as soon as possible to reduce the risk of attack. Protect your data and defend against cybercriminals. Download your FREE ISF cyber security awareness month resource kit today -

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (137)
Subscribers (21342)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user