Win with a data-driven defense
Almost no company in the world is correctly doing computer security defense. Imagine two armies engaged in a long-term fight against each other on a field of battle - one army has successfully managed to compromise its foe, again and again, by focusing most of its troops on the foes right flank. And instead of the foe rushing to put reinforcements on its right flank it keeps their troops evenly spread out, or perhaps even decides to put more of its defenders on the left flank. Sounds crazy, right? But this scenario is fairly indicative of most companys misaligned computer security defenses. Attend this session to learn the most common mistakes and how to create the most effective defense possible.