Sponsored By
Every organization gets compromised – it’s how you fast you detect and respond that counts. Trends like the overnight move to remote work and the subsequent increase in phishing attacks, the acceleration of cloud adoption, and proliferation of enterprise IoT have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or incident from becoming a full-scale data breach.
This segment is sponsored by ExtraHop Networks.
Visit https://securityweekly.com/extrahop to learn more about them!
For a free trial of Reveal(x)360 visit: www.extrahop.com/swbh Visit https://securityweekly.com/summercamp2020 to view the Live Stream and previously recorded micro-interviews.
Chat live with the Security Weekly Staff, Hosts, and Guests in our Discord Server: https://discord.gg/pqSwWm4
Full Episode Show NotesNavigating a Post-Compromise Reality
NoneHosts
[caption id="attachment_210" align="alignleft" width="120"] |
Guests
[caption id="attachment_210" align="alignleft" width="120"] |