Senior Vice President and General Manager, Security Management & Compliance Business Unit
RSA, the Security Division of EMC
With thousands of attack alerts each day, how do the critical ones rise to the top? Join this session to explore several case studies of the top 2011 attacks. Learn how they were discovered, then see how and why they were determined to be critical.
- Learn how to prioritize the alerts.
- Examine technology solutions for prioritizing.
- Hear how threat, vulnerability, hygiene, and visibility are all key.
- Learn how you can tell what information has left the workplace.