Find out how to detect sophisticated cyber attacks using network logging technologies (e.g. NetFlow and IPFIX). See how you can use these technologies to create an audit trail of network activity.
IT administrators and external contractors are trusted insiders with privileged access rights that often times have the broadest access to organization's critical business information, which is usually transmitted in encrypted form. This blinds forensic teams from knowing what exactly they are actually doing, posing a potential threat.
Join Matt Schofield and Jason Smith to understand how NTT Com Security and F5 Networks are applying both process and technology to help customers create and maintain an application security strategy designed not to obstruct the business.
How can you gain better visibility, sooner to the signs that you've been breached or that you're the target of an advanced threat?
With such a rapidly changing threat environment security teams are turning to external security partners to reduce their day to day pains - freeing up time to focus where they can add real value to the organisation.
Join Chris Taylor, Senior Product Manager at Entrust to discover why the mobile platform is more resilient to attack than the traditional desktop, and how strong digital identities can enable business applications and processes.