Can Cloud technology mitigate the risk of a breach? That was just one of the hot topics explored by Januszkiewicz today at the Gartner & Risk Management Summit in Dubai. Head over for a full report + slides.

Misconfiguration was the hot topic out in Dubai today as Paula brought her afternoon session at day one of the Gartner Security & Risk Management Summit to a close.

In the playfully titled Crouching Admin, Hidden Hacker: Techniques for Attacking and Securing Your Infrastructure Paula demonstrated how hackers exploit misconfiguration and other vulnerabilities in a system’s infrastructure to gain access and wreak havoc.

After painting a dark and detailed picture of how these are surreptitiously carried out Paula lightened proceedings by sharing practical techniques on how to defend against them. That is when you don’t have Sir Te’s Green Destiny sword to hand.

Windows Security Course  - blog banner - [Gartner‘18] Insider’s Guide to Paula J’s Session

APPLY NOW!

Can Cloud Tech Mitigate The Risk Of A Breach?

A portion of Paula’s session was devoted to Cloud technologies when she assessed how helpful and effective they are from a security perspective. Cloud and emerging technology security were one of the big themes at this year’s summit which aims to understand new threats and secure rapid innovation.

The receptive crowd left Paula’s session with plenty of ideas and inspiration on how to up security in their workspaces. How many of them recognised misconfiguration mistakes which they themselves have made is not clear, but it’s safe to say after Paula’s illuminating talk, they won’t be making them again!

>>> Slides From Paula J’s Session <<<

The Summit returns to the InterContinental Festival City tomorrow for its final day. You can find out more about this event on the Gartner website.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here