Posted on
in Presentations
Attendees will talk through their experiences with the types of behavior that can be detected to identify risky actions that can result in reputation or physical harm. Attendees should be prepared to talk about the types of tools they think are effective, the most useful analytics, the solutions that don’t yet exist, and their wish list for the next generation of tools. Attendance is strictly limited to allow for a small group experience.
Participants
Lisa Lee
Participant
Chief Security Advisor/BD Global Lead for Strategy & Research (S2IR), Microsoft
Share With Your Community