Tags: VMware, cybersecurity, conference
Here’s a compiled list of all 59 sessions for VMware’s own annual cybersecurity conference:
Link: Signup Here for VMware’s Security Connect (vmware.com)
Compiled List of all 59 Sessions:
- Achieving
Zero Trust on Your Internal Networks [1144]
- Automate
Threat Hunting and Incident Response Use Cases with Carbon Black Cloud and
SIEM [1147]
- Avoiding
Common Public Cloud Misconfigurations [1126]
- Blocking
Malware on Encrypted East-West Traffic [1125]
- Build
Trust with Anywhere Workspace [1133]
- Choosing
Your Developer Toolkit [1146]
- Cloud
Native Security in VMware Tanzu [1143]
- Cloud
Reputation Approvals: Security Perspective [1139]
- Cloud
Workload Protection, Simplified [1131]
- Common
Mistakes Seen During Incident Response Engagements [1168]
- CVE
Hyperinflation & What It Means For Security Teams [1149]
- Cyber-Physical
Security [1105]
- Delivering
Intrinsic Security [1108]
- Detection
to Proactive Remediation: Operationalizing Cloud Security Posture
Management [1130]
- Do
I Really Need That Expensive SIEM? [1127]
- eCrime
Industrialization: Modern Evolution of Cybercrime [1166]
- Enemy
Inside the Gates - 2020 Threat Landscape Key Findings [1170]
- Exposing
Vulnerabilities in Kubernetes [1169]
- Global
Security Insight 2021 Fireside Chat [1104]
- How
to Evolve Your SOC with the MITRE ATT&CK Framework [1115]
- How
to Leverage NSX To Detect Advanced Threats Evading the Perimeter [1137]
- How
to Prevent Ransomware Attacks [1120]
- Implementing
Query Packs Via Audit and Remediation APIs [1150]
- Improving
Endpoint Security Efficacy with VMware Carbon Black [1129]
- Insider
Threats: Dealing with the Attacks That Can Cause the Greatest Harm [1167]
- Kubernetes
Security Posture Management [1132]
- Mapping
NSX Security Controls to MITRE ATT&CK [1123]
- Modern
Bank Heist: From Heist to Hostage Situation [1165]
- Multi-cloud
Application Security with WAF [1122]
- Network
Security for the Modern Datacenter [1138]
- Network
Security Vision and Strategy [1111]
- One-Click
to Intrusion Detection and Prevention [1140]
- Operationalizing
Carbon Black Cloud for the Modern SOC [1148]
- Operationalizing
East-West Security: Customer Voices [1112]
- #PervasiveIntegrity:
Maturing Security into Resiliency [1179]
- SASE:
Accelerating & Simplifying Network Security in Times of Change [1117]
- Secure
Connectivity for Modern Apps [1109]
- Securing
a Remote Workforce using VDI Segmentation [1142]
- Securing
Remote Workers with VMware Carbon Black Cloud [1135]
- Securing
the Unsecurable [1114]
- Securing
Your Environment with On-Prem Security Environment [1136]
- Security
Hygiene for DevOps [1102]
- Security
Within The Application Lifecycle [1110]
- Seeing
Is Believing: Visualize Your Network Security Policy in Action [1145]
- Shift
Security Left and Accelerate Application Deployments [1118]
- Simplifying
Security for a Remote Workforce [1141]
- Simplifying
Your Endpoint Security With VMware Carbon Black [1128]
- Simplify
Security Complexity [1180]
- Simplify
Your Security - A Practical Example [1124]
- The
Evolution of the CISO: What It Means for All of Us [1101]
- The
Latest Attacks and How to Spot Them [1171]
- The
Mach 2 Mindset [1178]
- Threat
Detecting to Threat Hunting [1107]
- Threat
Hunting and Incident Response, Two Sides of the Same Coin [1116]
- Trusting
Zero Trust: How VMware IT Reimagined Security and Resiliency [1113]
- VMware
Security Innovation [1181]
- Vulnerability
Management for vSphere Admins [1119]
- Women
in Security: Encouraging Inclusivity and Representation [1103]
- Zero
Trust, Zero Pain: A Practical Implementation with VMware Security [1106]