Wednesday, March 28, 2018 | 1:00PM–1:45PM ET | Room 550
Session Type:
Breakout Session
Human interaction during an attack probably means you're too late. What level of automation can be introduced to identify critical assets and best control the porous nature of information technology today (mobile, cloud, IoT, etc.)?Security controls need to be able to measured and monitored. Focus on protecting that which is protectable.
Outcomes: Identify what is truly important in the infrastructure * Invest in mission-capable tools and process * Understand what automation is and, more importantly, isn't