Getting a Jump on Hackers

  • Tuesday, April 21, 2015 | 2:20 PM – 3:10 PM | West | Room: 2018

View all Sessions

A successful security program is one where network perimeters are defined. Hackers constantly probe perimeters using automated tools to exploit any vulnerabilities. This session will discuss why it is necessary to continuously audit your perimeter, and provide best practices for mitigating risks in the same way hackers perpetually attempt to breakthrough.


This document was retrieved from on Mon, 19 Aug 2019 10:25:28 -0400.