Identifying your crown jewels – a case of Pandora
FEATURED SPEAKER
AGENDA OF THE EVENT
Organizations that are reviewing their cyber incident posture, or even those that are looking to improve their cybersecurity maturity should focus on identifying their critical assets (or Crown Jewels) as one of their top priorities. It’s quite simple, you can’t protect an asset you don’t know you have!
As cybercriminal syndicates become more sophisticated and brazen with their attacks, organizations in critical infrastructure sectors need to assess their security posture to stay one step ahead. The traditional one-size-fits-all security strategy that includes strong user access protocols, authentication policies, and segmentation is sometimes not enough to help to ward off future attacks.
In this session, Thomas Zuliani will talk about how he and his team have been working with identifying the crown jewels in Pandora and how their work with different stakeholders have helped them in their processes of identifying the crown jewels.