Cybersecurity Asset Management, Cloud security, Insider threat, Zero trust

Navigating a Post-Compromise Reality – Michael Sanders – BH20 #2

Every organization gets compromised - it’s how you fast you detect and respond that counts. Trends like the overnight move to remote work and the subsequent increase in phishing attacks, the acceleration of cloud adoption, and proliferation of enterprise IoT have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or incident from becoming a full-scale data breach.

This segment is sponsored by ExtraHop Networks.

Visit to learn more about them!

For a free trial of Reveal(x)360 visit:

Sponsored By

ExtraHop Networks
Full episode and show notes


Michael Sanders
Michael Sanders
Senior Engineer at Extrahop

Michael is responsible for architecting security implementations across hyper-converged networks and is part of ExtraHop’s team of cloud security engineers who work directly with customers and prospects. A passionate technologist and evangelist, he brings fresh thinking to security threat detection. Prior to ExtraHop, Michael was a consultant working with multiple technologies across the security landscape. He holds a Masters Degree from the University of Arizona and a BBA from the University of Georgia. Michael speaks at industry events, supports security research organizations, and has been quoted in industry coverage.


Paul Asadoorian
Paul Asadoorian
Founder at Security Weekly
Matt Alderman
Matt Alderman
VP, Product at Living Security
prestitial ad