Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo International Forum B

Security done right - Shifting Left

Traditional security solutions detect threats after the cycle has begun. Anthony James will discuss with you blocking threats at the start of the cycle

calendar_today Tue, 25.10.2022, 10:30 - 10:45

event_available Hybrid

Action Video


Action description





Cloud Security Industry 4.0 / IoT / Edge Computing SIEM / Threat Analytics / SOC



This action is part of the event Forums it-sa Expo

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

The battle against cyber threats is ever-present, and there is no shortage of technologies designed to try and intercept attacks during the attack cycle.

Most security solutions are designed to inspecting the traffic and/or content users, and devices are downloading. Each time a user or device connects to a malicious site, the attack cycle has already begun, with the initial request, to the connection through the network and all of the security solutions doing their inspection.

We will discuss how you can leverage existing technologies in every network to stop the attack cycle at the initial request - essentially shifting left in the attack cycle. By shifting left, not only can you remove up to 90% of malicious activity within your network, but the result will give back capacity to your security solutions by not having to deal with known bad traffic.

... read more

Language: English

Questions and Answers: No



This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.