Videos no image

Published on July 7th, 2014 📆 | 2692 Views ⚑

0

A New Approach to Intrusion Detection and Prevention


iSpeech.org



Reactive security controls, such as traditional intrusion protection and prevention technologies, are no longer able to defend your organization against the polymorphic and complex attacks we face today. Instead, organizations must take a new approach to intrusion threats: rapid identification, analysis and response. This session shows how monitoring technologies, leading-edge analysis capabilities, intelligence sharing and incident management capabilities can be brought together to realize this new approach. We’ll describes the kind of information that enterprises should collect across their physical and virtual infrastructures, the kind of analysis to perform and the understanding of risk that is needed to deliver the visibility, analysis, and action that is needed for effective security in today’s world.

Author: Robert Griffin

Dr. Robert W. Griffin is Chief Security Architect at RSA, the Security Division of EMC, where he is responsible for technical architecture and standards. He is particularly active in RSA’s initiatives to address the challenges of new threats and new models for IT. This includes such areas as security architectures for cloud computing, embedded security capabilities for virtualized infrastructure, security strategies for big data and the application of game theory to cybersecurity. He represents EMC in several standards organizations, including as co-chair of the PKCS 11 Technical Committees and is the Technical Director for a major European Smart Grid research project. Mr. Griffin has 30 years of experience in identity management, security strategy, corporate governance, business process transformation and software development. He is a frequent speaker at many professional and industry conferences and has instructed courses within both professional and university settings. He is also an active blogger for RSA (http://blogs.rsa.com/author/griffin/ and on Twitter @RobtWesGriffin.





Any use of this material without the express consent of Positive Technologies is prohibited.

Likes: 1

Viewed:

source

Tagged with:



Comments are closed.