Posted on
in Presentations
Attendees will talk through their experiences with the types of behavior that can be detected to identify risky actions that can result in reputation or physical harm. Attendees should be prepared to talk about the types of tools they think are effective, the most useful analytics, the solutions that don’t yet exist, and their wish list for the next generation of tools. Attendance is strictly limited to allow for a small group experience.
Access this and other Conference presentations with your free RSAC™ Membership. Your Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with peers and experts, and more.
Participants
Lisa Lee
Participant
Chief Security Advisor/BD Global Lead for Strategy & Research (S2IR), Microsoft
Share With Your Community