This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Header Desktop Keysight
Launch Days Management I

HACK YOURSELF – Find it before THEY do!

Why it is worthwhile to hack your own IT security infrastructure regularly yourself.
Breach and Attack Simulation (BAS) tools enable security teams to hack their own network and simulate cyber attacks in their productive network.

calendar_today Wed, 07.10.2020, 11:30 - 11:45

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Cloud Security Data security / DLP / Know-how protection Industry 4.0 / IoT / Edge Computing Network Security / Patch Management SIEM / Threat Analytics / SOC Trend topic

Event

This action is part of the event Launch Days

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Security is never static - with ever new cyber attacks, misconfigurations and various security tools, new challenges for network security are constantly evolving. How can you achieve control over this ever-changing threat landscape? With Breach and Attack Simulation (BAS) tools, SecOps teams can turn the tables - by hacking themselves. Tools like Keysight Threat Simulator allow security teams to simulate the entire kill chain of cyber attacks in their production network. BAS tools such as Threat Simulator not only simulate the kill chain for cyber attacks, but also provide SecOps teams with security spend analysis and dynamic remediation recommendations: - Budget optimization by maximizing the effectiveness of existing security controls and processes - Continuous measurement and testing of the current safety situation - Prevent previous incidents and cyber attacks from happening again - Understand how new cyber threats behave in a production environment - Determine the right mix of security controls and realistic cyber risks Take part in our webinar and learn why it is worthwhile to hack your own IT security infrastructure regularly yourself. ... read more

Language: German

Questions and Answers: Yes

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.