Posted on
in Presentations
Remote work shifted the security perimeter out of known networks into unknown networks. With Zero Trust tools being used to isolate systems, learn why it is important to rethink the threat model of the remote worker, why SIEM tools need different data to identify users and assets, and why a reassessment of the assumptions of users and their network’s behavior is necessary for effective security monitoring.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community