Anecdotally, the amalgamation of offensive and defensive security is the fastest way to make progress towards an effective and mature cyber security capability. When red meets blue, understanding becomes increasingly true. The problem is, these teams don't naturally work together. Rather, there is often some animosity between the two resulting in suboptimal outcomes. In this talk we'll explore the benefits of purple teaming and how it can effectively improve your cyber security posture, no matter your current “age”.
Modern attackers have pivoted to targeting people. A simple internet search can tell them all they need to know about who has access to the system or data they are targeting. In addition, the insider threat is greater than it ever was with 40% of Swedish employees admitting to taking corporate data to their next role.
Attend Proofpoint keynote to learn how external criminals and insider threats continue to reach new levels of success and how you can defend against data loss while driving down operational complexity.
Intelligence is what makes the difference: understanding the threat landscape and cyber climate is the key to making the right investments!
Intelligence is what makes the difference: understanding the threat landscape and cyber climate is the key to making the right investments!
Mastering the art of offensive and defensive security
As one of Black Hat briefing’s longstanding training partners, our courses have taught thousands of students about the art of offensive and defensive approaches.
If you want to understand how criminals run hacking campaigns, and emulate them, this session is for you.
Detection capabilities – what does it mean in the real world
There is no best type of threat detection. Each category can support different requirements and approaches depending on the business need.
As your attack surface increases, you need the combination best suited to your needs.
We present some best practices straight from the experiences of our CyberSOC.
Zero Trust Security model – paradigm shift
ZeroTrust: “Never trust, alwaysverify” – is the guiding principle in the Zero Trust architecture approach.
SASE changes the future of network security. Learn why you need a true cloud-native SASE architecture.
Microsegmentation: Learn why this is an emerging security best practice.
Ahead of the risks - with strategic security
Join this strategic round table session led by our Governance Risk and Compliance Manager and a Senior Advisor from Radar https://radareco.se/.
Discuss how geopolitics affects us and how to assess the risks, improve your defences, and plan your cyberattack response.
In this session we have limited seats, to be able to discuss and collaborate around the specific topics.