Loading…
This event has ended. Visit the official site or create your own event on Sched.
ONLINE REGISTRATION IS NOW CLOSED. Please visit us on-site during registration hours next week to get a badge.

About the CONNECT Conference:                                                        

Today’s threat landscape is broad and sophisticated, and the consequences for failing to adequately protect against threats and respond appropriately when an attack is underway are far reaching. SecureAuth and Core Security deliver to enterprise-class organizations a discover, secure & protect, and respond capability that is only possible with vulnerability, endpoint, and network security fused with a strong identity protection framework.

Identity-based security automation is a new category that reflects the challenges of a silo’ed approach to enterprise security. Automation in the security operations center (SOC) is the inevitable result of increasingly sophisticated technologies and automation is only possible when false positive and negative results are minimal and the response action is precise and coordinated to minimize restrictions on legitimate access to enterprise resources.

SecureAuth and Core Security customers attending the CONNECT event will hear from company leaders, respected speakers, and industry peers on this new approach to the threat landscape. Product sessions will dive into details on current and future products, and research team members will be available to discuss new technologies. 

REGISTER TODAY

View analytic
Wednesday, October 18 • 1:45pm - 2:30pm
Vulnerability Insight Tips & Tricks

Sign up or log in to save this to your schedule and see who's attending!

Everyone loves a good tip, like using a stick of spaghetti to light a hard to reach candle wick or using Doritos to start a fire. In this session VI users will learn the top tips and tricks for both the GUI and configurations. Along with ingesting router data and using it for attack path identification, users will learn how to quickly use the existing Attack Strategy to first prioritize any immediate critical vulnerabilities, how to setup campaigns for critical assets and tips for report usage and customization. There will also be time for users to share their favorite tips with other attendees. The more we all share, the more value everyone can get from the tool.

Speakers
avatar for Magno Gomes

Magno Gomes

SE Manager, Core Security


Wednesday October 18, 2017 1:45pm - 2:30pm
Ellington Salon C

Attendees (9)