In this full-day workshop, you will an in-depth look at real life deployment examples for the most effective protections against Cybercrime, like Allow-Listing, Principle of Least Privilege, PAM/PAW/SAW, MFA, IPsec, Fabric protections, Backups, and so much more. 
You don't want to miss this Sami Laiho deep-dive into how to fight Against Breaches and Ransomware in your organization.
You will learn:
- How to technically deploy Principle of Least Privilege
 - How to technically deploy Allow-Listing
 - How to technically deploy network protections (like IPsec)