Главная
Study mode:
on
1
DEFENSE
2
EXISTING CONTROLS NOT OPTIMIZED
3
SPENDING MORE ON SECURITY
4
FIREWALLS
5
OUTBOUND FILTERING
6
INTRUSION DETECTION / PREVENTION
7
NOT EVERYONE IS A THREAT
8
NETWORK SEGMENTATION
9
FIX VULNERABILITIES
10
WEB PROXY
11
APPLICATION LAYER FIREWALL
12
CLIENT PROTECTION STILL IMPORTANT
13
BRINGING IT ALL
Description:
Explore defense-in-depth strategies for enhancing your organization's security posture in this 44-minute conference talk from BSides Cleveland 2015. Learn how to optimize existing controls, implement effective network segmentation, and leverage tools like firewalls, intrusion detection systems, and web proxies. Discover the importance of outbound filtering, vulnerability management, and application layer protection. Gain insights on balancing security investments and recognizing that not all threats are equal. Acquire practical knowledge to build a comprehensive, multi-layered security approach that protects your digital assets like a well-fortified castle.

Defense in Depth - Your Security Castle

Add to list