Главная
Study mode:
on
1
Intro
2
Joke
3
The Bottom Line
4
Cyber Security
5
The old days
6
Cost is no objective
7
Cost restrictions
8
Defining networks
9
Lateral movement
10
Zero trust
11
Data
12
OSI Model
13
Perimeter Defense
14
Challenge
15
Inside
16
Micro segmentation
17
Hybrid model
18
Takeaway
19
The problem
20
The network administrator
21
Reduce the attack surface
22
Question time
23
Companies using Stealth
24
Bringing it all 360
25
Software
26
Lightning
Description:
Explore micro-segmentation and security strategies in this 29-minute conference talk from BSides Augusta 2016. Delve into the evolution of cyber security practices, from the old days of unlimited budgets to modern cost restrictions. Examine the challenges of lateral movement within networks and the concept of zero trust. Analyze the limitations of traditional perimeter defense and discover how micro-segmentation can reduce attack surfaces. Learn about hybrid models and real-world applications of stealth technologies. Gain valuable insights into network administration, software solutions, and comprehensive security approaches for today's complex digital landscape.

Micro Segmentation and Security - The Way Forward

Add to list
0:00 / 0:00