Thursday, November 9, 2023

Users, devices, and applications.  All of these are network edges and each one represents a potential weak link in the security chain.  It’s not a question of whether to secure each of these edges but rather how to secure them and improve the overall security posture of the network. This session will focus on how a strategic security approach ensures maximum protection while minimizing complexity at the same time.