In this full-day workshop, you will an in-depth look at real life deployment examples for the most effective protections against Cybercrime, like Allow-Listing, Principle of Least Privilege, PAM/PAW/SAW, MFA, IPsec, Fabric protections, Backups, and so much more.
You don't want to miss this Sami Laiho deep-dive into how to fight Against Breaches and Ransomware in your organization.
You will learn:
- How to technically deploy Principle of Least Privilege
- How to technically deploy Allow-Listing
- How to technically deploy network protections (like IPsec)