This resource is no longer available

Cover Image
How do we insure the critical applications and the networks that deliver them are properly protected and available? In this session, Mike will identify where we have risk in keeping critical applications and the networks that deliver them available whether during peace time or when under attack.  To properly dimension the risk, Mike will provide an overview of application and network threats.  Then, he will investigate the attack lifecycle for both applications and networks that deliver them followed by an inspection of what security controls are relevant, and where we place them for maximum effectiveness, he will finish by covering what “protection” and “availability” look like in our networks today. - Learn to identify the risk in delivering critical applications and the networks that deliver them - Learn about relevant threats - Learn about the threat lifecycle and how to apply it - Learn about the relevant security controls and where do we put them for maximum effectiveness
Vendor:
Posted:
Aug 25, 2022
Premiered:
Aug 25, 2022, 02:00 EDT (06:00 GMT)
Format:
Type:
Webinar

This resource is no longer available.