Learn how to develop a plan to minimize attack surface and protect critical assets.
Learn how to prepare for a cyber attack during a critical time.
Learn the internal and external forces that impact security strategy.
Learn how Accuvant can provide the right mix of knowledge and expertise to fill the CISO office.
Learn the details and recommended actions to take regarding the POODLE bug.
Learn how an intelligence-driven approach to security is different than other methods.
Learn about exploits and the challenges organizations face when addressing them.
Learn the details and recommended actions to take regarding the Bash Shellshock bug.
View this presentation to learn about building a cluster, tools to manage one, and ways to leverage it to be more successful in auditing and exploit development tasks.