Posted on
in Presentations
The last 25 years have exposed old and new cybersecurity patterns. There is a primal draw to those hot and elite threat actors at the detriment of common security. This presentation will share a practical cybersecurity method employed for our 300+ deployed cloud subscriptions and hundreds of products. Learn how to focus those vital engineering hours where they will benefit your customers the best.
Learning Objectives:
1: Learn how to balance your security requirements with product teams.
2: Understand what risks you need to include when in the minimum viable product world.
3: Learn how you can deliver products at scale in the world that meet industrial security requirements.
Learning Objectives:
1: Learn how to balance your security requirements with product teams.
2: Understand what risks you need to include when in the minimum viable product world.
3: Learn how you can deliver products at scale in the world that meet industrial security requirements.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community