Getting a Jump on Hackers

  • Tuesday, April 21, 2015 | 2:20 PM – 3:10 PM | West | Room: 2018

View all Sessions

A successful security program is one where network perimeters are defined. Hackers constantly probe perimeters using automated tools to exploit any vulnerabilities. This session will discuss why it is necessary to continuously audit your perimeter, and provide best practices for mitigating risks in the same way hackers perpetually attempt to breakthrough.


This document was retrieved from on Fri, 24 Mar 2017 00:17:50 -0400.
© 2017 EMC Corporation. All rights reserved.