Every organization gets compromised – it’s how you fast you detect and respond that counts. Trends like the overnight move to remote work and the subsequent increase in phishing attacks, the acceleration of cloud adoption, and proliferation of enterprise IoT have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or incident from becoming a full-scale data breach.
This segment is sponsored by ExtraHop Networks.
Visit https://securityweekly.com/extrahop to learn more about them!
Chat live with the Security Weekly Staff, Hosts, and Guests in our Discord Server: https://discord.gg/pqSwWm4Full Episode Show Notes
Navigating a Post-Compromise RealityNone
|[caption id="attachment_210" align="alignleft" width="120"] Matt Alderman - CEO[/caption]|
|[caption id="attachment_210" align="alignleft" width="120"] Michael Sanders - Senior Engineer [/caption]|