How to Protect Next Generation Technology from Modern Threats

How to Protect Next Generation Technology from Modern Threats

Network Security and Ransomware Theatre

Thu 27th Sep 09:30 to 10:00

Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.

Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

What you will take away from this session

  • What are the threats to next generation technology?
  • Best practices for assessing, prioritizing, and addressing next generation risks
  • Security best practices for securing your enterprise against the unique threats in next generation technologies

Speakers

Photo Speaker Name Profile
Morey J. Haber Morey J. Haber View Profile
Top