|
Start Date:9/23/2020
Start Time:2:00 PM EDT
Duration:15 minutes
Abstract:
You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access.
If you're already registered for the Hardening and Fortifying (3:56) webcast, click below:
ALREADY REGISTERED?
Speakers
 Anonymized 12264883
|
Hardening and Fortifying (3:56)
Registration Is Closed
|
|
|
© 2025. All rights reserved.
|