Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats 1-2pm
The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a methodology that most security practitioners know well. Fast forward to the present day where the security stack is more flexible to adapt to the borderless perimeter of most orgs – it’s fair to state that we’ve learned to architect these controls to adapt to the shift in the security landscape. Join presenter Stevan Sheely to take a step back and learn how an attacker would view these controls. Plus, learn how attackers architect ways to bypass these controls. Time to think like the unauthorized actor attempting to penetrate your organization’s security controls What you’ll learn: The thoughtful planning behind breaches – including timing and basic objectives How a malicious attacker looks at security controls What you could possibly be overlooking in the form of basic security controls to help mitigate breaches
Speaker and Presenter Information
Stevan Sheely, Technical Solutions Architect, Cisco
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Wed, Jan 18, 2023, 1:00pm - 2:00pm
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Organizer
Cisco