Star 0

Abstract

This talk will describe effective techniques you can use to systematically evaluate the effectiveness of the perimeter, network and endpoint controls protecting end-user systems.