Additional Content Download
If you would like to recieve a copy via email, contact me directly at firstname.lastname@example.org.
Wes Devault, Lead Enterprise Architect at Cimarex, discusses the usage of social engineering attacks and the means for identifying suspicious email correspondence in this presentation from last year's event. He also shares how to employ strict access amangement strategies to mitigate proliferation of an intrusion across networks and developing advanced and recurring training programs to engender awareness across all levels of personnel.
Secure Information Sharing: Addressing Cyber Threats and the Benefit of Cyber Attack Information Sharing
Scott Langendorf is Senior Manager of Cyber Security Incident Response at Baker Hughes. In this past presentation, he discusses the importance of the four information sharing types BroNet, Vendor, IntelBus and Government so that companies can assist each other to prevent breaches or better enhance their detective capabilities.
To recieve this via email, contact me directly at email@example.com.
To recieve a copy via email, contact me directly at firstname.lastname@example.org.