
HACK YOURSELF – Find it before THEY do!
Why it is worthwhile to hack your own IT security infrastructure regularly yourself.
Breach and Attack Simulation (BAS) tools enable security teams to hack their own network and simulate cyber attacks in their productive network.
Topic
Cloud SecurityData security / DLP / Know-how protectionIndustry 4.0 / IoT / Edge ComputingNetwork Security / Patch ManagementSIEM / Threat Analytics / SOCTrend topic
When & Where
Wed, 10/07/2020, 11:30 - 11:45
Details
Format:
Management lecture
Session description
Security is never static - with ever new cyber attacks, misconfigurations and various security tools, new challenges for network security are constantly evolving. \nHow can you achieve control over this ever-changing threat landscape? With Breach and Attack Simulation (BAS) tools, SecOps teams can turn the tables - by hacking themselves. Tools like Keysight Threat Simulator allow security teams to simulate the entire kill chain of cyber attacks in their production network. \nBAS tools such as Threat Simulator not only simulate the kill chain for cyber attacks, but also provide SecOps teams with security spend analysis and dynamic remediation recommendations:\n \n- Budget optimization by maximizing the effectiveness of existing security controls and processes \n- Continuous measurement and ...
Moderator
