Network Security and Ransomware

Network Security and Ransomware

 The network is the heart of the enterprise, and has never been better defended but it still remains extremely vulnerable. The programme in this theater provides access to some of the best experts and vendors who will share the latest technologies and practices to help all of us understand how to protect our networks against a terrifying array of new threats from targeted DDos attacks to the latest evolving ransomware.

Network Security and Ransomware Speakers

Rod Simmons
Rod Simmons

Director of Product Management  BeyondTrust

View

Rod Simmons

Network Security and Ransomware Seminars

  • Wed 17th Oct 10:50 - 11:20
  • Brought to you by eSentire

    Network Security and Ransomware Theatre

    Wed 17th Oct 10:50 to 11:20

  • Wed 17th Oct 13:00 - 13:30
  • Brought to you by ProtectWise

    Network Security and Ransomware Theatre

    Wed 17th Oct 13:00 to 13:30

  • Wed 17th Oct 13:40 - 14:10
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    Network Security and Ransomware Theatre

    Wed 17th Oct 13:40 to 14:10

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
     

  • Thu 18th Oct 09:30 - 10:00
  • How to Protect Next Generation Technology from Modern Threats Rod Simmons  |   BeyondTrust   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 18th Oct 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Rod Simmons Rod Simmons View Profile
  • Thu 18th Oct 10:50 - 11:20
  • Brought to you by eSentire

    Network Security and Ransomware Theatre

    Thu 18th Oct 10:50 to 11:20

Top