A majority of organizations deploy the perimeter security architecture. This model involves securing what goes into or out of your environment. Firewalls and border gateways act as security checkpoint similar to airport security. Yet this model is deeply flawed and insufficient. Join the first part of this webcast series to identify why perimeter security is failing us. Subsequent webcasts will then go into details on filling the gaps left over.
This webcast focuses on the weaknesses of a perimeter architecture, and also goes into how the perimeter security architecture mindset is baked into most security technologies today.
Join Justin Henderson at the SANS Tactical Detection & Data Analytics Summit & Training, December 4-11, in Scottsdale, AZ. As the Summit co-chair, Justin will lead two days of presentations and panel discussions that demonstrate how high-value log sources, monitoring tools, and sound analysis techniques can be leveraged to detect bad in your network. Following the Summit, take SEC530: Defensible Security Architecture with Justin and learn to build and maintain a truly defensible security architecture.
Check out all other upcoming opportunities to take SEC530: Defensible Security Architecture