<< Back to Sessions Guidance to a well defined Privileged Access Management Program We often see that the challenges associated with implementing a Privilege Access Management (PAM) program are not a result of a lack of technology. In order to have a successful...
<< Back to Sessions Threat Intelligence and DNS for Rapid Cybersecurity Incident Response DNS is one of the only foundational IT services with threat intelligence built into the standard. Despite this fact, even advanced cyberteams are not taking advantage of...
<< Back to Sessions Taking a behavioral approach to security- how to stay one step ahead of your adversaries Join LogPoint’s Jake McCabe as he discusses how thinking about security from the perspective of adversary behavior can help organizations better prepare...
<< Back to Sessions The Impact of Digital Transformation in the Face of Today’s Threats Digital Transformation & the rapid need for supporting remote workers for digital business processes took every industry by storm. This change has presented new...
<< Back to Sessions Digestible Cybersecurity Knowledge, with ten times the science Make decisions based on science and evidence, its easier said than done. SERENE-RISC is a Montreal-based, government-funded project that not only makes cybersecurity research...
<< Back to Sessions Scanning Isn’t Enough: Measuring true risk with a Risk-Based Vulnerability Management program The threat landscape isn’t just changing at blinding speeds, it’s expanding into areas and devices that many never considered before....
Recent Comments