Be the first to like this
Security today is fundamentally broken and an overhaul is desperately needed. Today's advanced cyber threats evade both detection and prevention by current approaches to network security - whether you want to believe it or not. Most organisations have developed an over-reliance upon network-layer, perimeter-focused solutions that require signatures or statistical-based foreknowledge of each technical threat. As proven through endless security breaches over the last few years, most legacy solutions are obsolete with each new action of focused adversaries, such as cyber criminals and nation-state groups, and because of their ever-changing attack methods, including targeted and zero-day malware, obfuscation, and covert network channels. This session focuses on the true nature and sources of today's advanced threats, and describes solution characteristics, both technology and operations-related, which are required to combat these threats and close critical network visibility gaps.
Clipping is a handy way to collect important slides you want to go back to later.