Assume Breached!

Logo
Presented by

Dan Vetrivanathan, APAC Customer Engineer, Mandiant, now a part of Google Cloud

About this talk

The best method for breach preparation is ASSUMED as opposed to the initial IF which then moved onto WHEN. Security teams should approach validation using a trusted actor methodology by simulating breaches as authorized users. This will identity business risks generated from security weaknesses, vulnerabilities and mis-configurations. The ultimate target is having the ability to assess the impact on organization's critical data and assets. Join this session to learn more about how to be best prepared for a breach, by managing your initial assumptions.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (147)
Subscribers (16568)
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.