Next Gen Perimeter Protection
As attacker techniques shift, organizations must have a robust strategy to address both insider and external threat actors. While the recent April program focused on insider threats, this session will focus on preventing and detecting advanced attacks at the perimeter. In these sessions, various presenters will cover emerging technologies and approaches to perimeter protection as well as key considerations for identifying and implementing the next generation of applicable technology.
Perimeter Defense: Presented by Lastline
Jeff Pollard has more than 10 years of information security experience including roles specializing in forensics, incident response, malware reverse engineering, managed security services, and consulting. He joined Lastline in March of 2015 and acts as Worldwide Technical Architect focused on educating organizations on the use of evasive attack tools by advanced threat actors. Prior to joining Lastline, Jeff was a Global Architect for Mandiant (now a FireEye company). He’s been a part of presales engineering and consulting teams for Dell SecureWorks and Verizon focused on Global customers with responsibilities spanning from technical architecture to engagement management. His primary focus is on Security and Incident Response workflow – enabling Security Operations and Incident Response teams to rapidly assess, contextualize, respond, and adapt to sophisticated threat actors and their techniques. In addition he enjoys the study of macro and micro trends in attack tools, threat actor behavior, and threat intelligence.
Perimeter Defense: Presented by Palo Alto Networks