Handling Post-Compromise Security Challenges π
Learn how organizations can quickly detect and respond to security breaches amid remote work trends and evolving threats.

Security Weekly - A CRA Resource
94 views β’ Aug 4, 2020

About this video
Every organization gets compromised - itβs how you fast you detect and respond that counts. Trends like the overnight move to remote work and the subsequent increase in phishing attacks, the acceleration of cloud adoption, and proliferation of enterprise IoT have expanded the attack surface and complicated the job of security professionals. Weβll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or incident from becoming a full-scale data breach.
This segment is sponsored by ExtraHop Networks.
Visit https://securityweekly.com/extrahop to learn more about them!
For a free trial of Reveal(x)360 visit: www.extrahop.com/swbh
Visit https://securityweekly.com/summercamp2020 to view the Live Stream and previously recorded micro-interviews.
Chat live with the Security Weekly Staff, Hosts, and Guests in our Discord Server: https://discord.gg/pqSwWm4
Show Notes: https://securityweekly.com/bh202
This segment is sponsored by ExtraHop Networks.
Visit https://securityweekly.com/extrahop to learn more about them!
For a free trial of Reveal(x)360 visit: www.extrahop.com/swbh
Visit https://securityweekly.com/summercamp2020 to view the Live Stream and previously recorded micro-interviews.
Chat live with the Security Weekly Staff, Hosts, and Guests in our Discord Server: https://discord.gg/pqSwWm4
Show Notes: https://securityweekly.com/bh202
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
94
Likes
1
Duration
18:28
Published
Aug 4, 2020
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.