Keysight Header

HACK YOURSELF – Find it before THEY do!

Why it is worthwhile to hack your own IT security infrastructure regularly yourself.
Breach and Attack Simulation (BAS) tools enable security teams to hack their own network and simulate cyber attacks in their productive network.

Topic

Cloud SecurityData security / DLP / Know-how protectionIndustry 4.0 / IoT / Edge ComputingNetwork Security / Patch ManagementSIEM / Threat Analytics / SOCTrend topic

When & Where

calendar_month

Wed, 10/07/2020, 11:30 - 11:45

Download session as iCaldownload_for_offline

Details

  • Format:

    Management lecture

Session description

Security is never static - with ever new cyber attacks, misconfigurations and various security tools, new challenges for network security are constantly evolving. \nHow can you achieve control over this ever-changing threat landscape? With Breach and Attack Simulation (BAS) tools, SecOps teams can turn the tables - by hacking themselves. Tools like Keysight Threat Simulator allow security teams to simulate the entire kill chain of cyber attacks in their production network. \nBAS tools such as Threat Simulator not only simulate the kill chain for cyber attacks, but also provide SecOps teams with security spend analysis and dynamic remediation recommendations:\n \n- Budget optimization by maximizing the effectiveness of existing security controls and processes \n- Continuous measurement and ...

Moderator