Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Convergence: Configurations, Vulnerabilities and Unexpected Changes


Published on

All organisations apply multiple security controls to ensure that they have a more holistic and comprehensive approach to security. However, many of these controls sit as islands within a sea of data, providing limited information beyond their single core function. By converging appropriate technologies, you can gain a better understanding of your risk posture and start gaining far more from the controls you already have.

This presentation covers the concepts behind convergence, what it means for Information Security, and examples of how to gain value from it.

Published in: Software
  • Be the first to comment

  • Be the first to like this