Handling Post-Compromise Security Challenges πŸ”

Learn how organizations can quickly detect and respond to security breaches amid remote work trends and evolving threats.

Handling Post-Compromise Security Challenges πŸ”
Security Weekly - A CRA Resource
94 views β€’ Aug 4, 2020
Handling Post-Compromise Security Challenges πŸ”

About this video

Every organization gets compromised - it’s how you fast you detect and respond that counts. Trends like the overnight move to remote work and the subsequent increase in phishing attacks, the acceleration of cloud adoption, and proliferation of enterprise IoT have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or incident from becoming a full-scale data breach.

This segment is sponsored by ExtraHop Networks.

Visit https://securityweekly.com/extrahop to learn more about them!

For a free trial of Reveal(x)360 visit: www.extrahop.com/swbh

Visit https://securityweekly.com/summercamp2020 to view the Live Stream and previously recorded micro-interviews.

Chat live with the Security Weekly Staff, Hosts, and Guests in our Discord Server: https://discord.gg/pqSwWm4

Show Notes: https://securityweekly.com/bh202

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

94

Likes

1

Duration

18:28

Published

Aug 4, 2020

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.