Star 0

Abstract

A successful security program is one where network perimeters are defined. Hackers constantly probe perimeters using automated tools to exploit any vulnerabilities. This session will discuss why it is necessary to continuously audit your perimeter, and provide best practices for mitigating risks in the same way hackers perpetually attempt to breakthrough.