Loading…
View analytic
Wednesday, October 18 • 1:00pm - 1:45pm
How to Defeat the Vulnerability Hydra

Sign up or log in to save this to your schedule and see who's attending!

Vulnerability Management is like a Hydra, chop off one head and two more grow back. It is impossible to keep up. How do you prioritize? How can you get ahead? Maybe “ahead” is too ambitious - but what about drastically reducing risk? One way to make an impact is with attack path mapping. Allowing VM teams to quickly identify the weak device in the chain on how an attacker could move laterally to the so called “Crown Jewels.” In this session, users will learn the best practices on how to ingest router and firewall data for better attack path mapping and how to quickly break the chain in the attack path, allowing you to sever the head of the Hydra. 

Wednesday October 18, 2017 1:00pm - 1:45pm
Ellington Salon C

Attendees (1)