Operationalizing Zero Trust Model with Adaptive Security

  • Webcast Aired Wednesday, 07 Nov 2018 1:00PM EST (07 Nov 2018 18:00 UTC)
  • Speakers: Franco Negri, Salvatore Sinno, Usamah Hassan

The historical approach to network security was one built on strong perimeter defenses and a well-understood concept of resource and infrastructure allocation. Today's reality is completely different. With amorphous perimeters, ubiquitous use of connected devices, cloud adoption and availability of powerful exploitation tools to adversaries in play, a security breach is not a matter of if, but a matter of when. It is imperative that organizations shift their security mindset from 'incident response ' to 'continuous response ', where systems are assumed to be compromised and requires continuous monitoring and remediation.

Organizations can achieve such capabilities by developing an Adaptive Security Architecture, which aims to contain active threats and to neutralize potential attack vectors. In this webcast, Unisys and LogRhythm experts will introduce concepts associated with adaptive security and shows how Unisys Stealth ' and LogRhythm (LR) provide a unified platform to enhance system survivability and reduce the impact of potential threats.

By attending this session, you will be able to

1. Understand the need to shift mindset from 'incident response ' to 'continuous response '.

2. Develop a comprehensive understanding of Adaptive Security Architecture concepts including Preventive, Detective, Retrospective and Predictive capabilities.

3. Understand how integrated software-defined microsegmentation and SIEM capabilities enable the cohesive orchestration and management of people, processes, and technology into a 'unified ' Threat Lifecycle Management (TLM) framework necessary for the early detection and mitigation of advanced cyber threats.

4. See a live demonstration of Unisys Stealth and LogRhythm integration that enables detection, alerting and immediate response to suspicious network activity.