Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats 1-2pm



The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a methodology that most security practitioners know well. Fast forward to the present day where the security stack is more flexible to adapt to the borderless perimeter of most orgs – it’s fair to state that we’ve learned to architect these controls to adapt to the shift in the security landscape. Join presenter Stevan Sheely to take a step back and learn how an attacker would view these controls. Plus, learn how attackers architect ways to bypass these controls. Time to think like the unauthorized actor attempting to penetrate your organization’s security controls What you’ll learn: The thoughtful planning behind breaches – including timing and basic objectives How a malicious attacker looks at security controls What you could possibly be overlooking in the form of basic security controls to help mitigate breaches

Speaker and Presenter Information

Stevan Sheely, Technical Solutions Architect, Cisco

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Wed, Jan 18, 2023, 1:00pm - 2:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
Cisco


Contact Event Organizer



Return to search results