To quote Sun Tzu, \If you know the enemy and know yourself, you need not fear the results of a hundred battles." According to Verizon's DBIR, nearly 90% of successful endpoint compromises included ransomware, spearphishing, credential theft and social engineering. Technologies such as the browser are widely used and play a crucial role in early stages of many intrusions.
As businesses continue to adopt the cloud, and employees migrate to remote working, it is time to reconsider how we approach security. Traditional security models while useful, have stretched our resources and sometimes lulled us into a false sense of security. It's time to ask some basic questions, to revisit some basic assumptions.
Attendees at this webcast will learn: '