Jamie Moles on Navigating Post-Compromise Security π
Senior Security Engineer Jamie Moles discusses rapid detection and response strategies for enterprise security after a breach.

VirtuPort
45 views β’ Jun 7, 2021

About this video
Navigating Enterprise Security In A Post-Compromise Reality
Every organization gets compromised β itβs how you fast you detect and respond to an incident that counts. This is especially important when you look at trends like the overnight move to remote work, the rise in encrypted traffic and acceleration of cloud adoption, as well as the proliferation of enterprise IoT that have expanded the attack surface and complicated the job of security professionals. Weβll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or an incident from becoming a full-scale data breach.
Every organization gets compromised β itβs how you fast you detect and respond to an incident that counts. This is especially important when you look at trends like the overnight move to remote work, the rise in encrypted traffic and acceleration of cloud adoption, as well as the proliferation of enterprise IoT that have expanded the attack surface and complicated the job of security professionals. Weβll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or an incident from becoming a full-scale data breach.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
45
Duration
16:29
Published
Jun 7, 2021
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now