• Start Time:
  • End Time:
  • Day:
    Day 2


Hacking has proven a relatively risk-free way to obtain sensitive data and IP in recent years, with attackers able to lurk for months on networks, conducting essential surveillance and compromising the credentials they need to move laterally before launching their endgame – whatever that might be. We don’t necessarily lack visibility of what is going on in our networks but we certainly lack the ability to tell whether what is going on is something that can be trusted…or something that needs attention. This session will cover how to correctly apportion risk to network activity by focusing on managing and securing the credentials that allow access to critical assets. It will argue that it is crucial to identify what is truly necessary to secure and to implement a strategy to support this that provides a defensible ROI argument.

Associated Speakers:

David Higgins

EMEA Technical Director


Associated Talks:

01:30PM - Day 2

View Keynote: Protecting the Apps, Assets and Services That Run Your Business

11:20AM - Day 2

View Panel: Implementing DevSecOps in Enterprise

10:50AM - Day 1

View Panel: The evolution of cloud for enterprise cybersecurity

10:20AM - Day 1

View Keynote: Why Privileged Access Management (PAM) Is A Digital Transformation Essential

View Full Info