Securing Cloud & Automation: Keep Friends Close & Enemies Closer– Session 3 of 3

January 8, 2021

In this session we will discuss how the global pandemic has accelerated digital transformation, bringing more automation and cloud adoption but how ultimately, despite the changing landscape, the attackers’ methods and route are still the same – identity compromise. We discuss the identities, credentials and secrets used and how to protect them.

Previous Flipbook
Endpoint Security Review: a Defense-in-depth Perspective on Ransomware
Endpoint Security Review: a Defense-in-depth Perspective on Ransomware

Explore the 5 essential elements of a defense-in-depth approach to ransomware protection. Multi-layered end...

Next Video
Securing Remote Infrastructure: Keep Friends Close & Enemies Closer – Session 2 of 3
Securing Remote Infrastructure: Keep Friends Close & Enemies Closer – Session 2 of 3

2020 has intensified demands around supply chains and external cloud services provision. This session looks...