Learn about the role that insecure and imprudent device configurations play in an organization's overall risk and threat exposure. More importantly, learn
how those risks and threats can be effectively managed and mitigated at scale, with ease, and without compromising business continuity! Golden images
are great, but if you're not aware of and can't define the drift, they won't be of much use. Similarly, group security policies are only as good as their design &
enforcement, and validation in those regards is typically inadequate. Add in the fact that responsibilities cut across teams (IT and Security) with different pe……