Getting a Jump on Hackers

  • Tuesday, April 21, 2015 | 2:20 PM – 3:10 PM | West | Room: 2018

View all Sessions

A successful security program is one where network perimeters are defined. Hackers constantly probe perimeters using automated tools to exploit any vulnerabilities. This session will discuss why it is necessary to continuously audit your perimeter, and provide best practices for mitigating risks in the same way hackers perpetually attempt to breakthrough.


This document was retrieved from on Sun, 23 Oct 2016 10:18:04 -0400.
© 2016 EMC Corporation. All rights reserved.