Due to the wide variety of security solutions (VPN, antivirus, firewall, iDMZ segmentation, backups and much more ) it is not easy to choose where to start. Thanks to its 5 pillars Identify, Protect, Detect, Response, Recover, the NIST framework establishes a correspondence with the timeline of an attack (Before, During and After an attack)
Through this workshop, we will provide concrete examples of elements:
- To be implemented before an attack happens to protect against it
- To be used at the time of the attack to ensure detection
- To be triggered when an attack has occurred in order to fully restore operational services.
The NIST framework can also be used by those who have already started their cybersecurity journey, some use cases will be presented to gain power.
Geoffroy Moens – Schneider Electric
Deze presentatie wordt in het Engels gegeven