Training

Events

Tech Spotlight: Journey Through the IoT to the Cloud: Finding the ‘Zero-day’ Vulnerabilities

Tech Spotlight: Journey Through the IoT to the Cloud: Finding the ‘Zero-day’ Vulnerabilities

Check Point’s white hat research team which has discovered the existing malware out in the wild and also the’zero-day vulnerabilities discusses use cases around how organizations with responsible disclosure can further secure networks and devices.

It is imperative for organizations to under what the threat actors are doing in real-time.

The session discusses:

  • Findings around the ‘zero-day’ vulnerabilities;
  • Detecting threat actors movements in the networks, IoT devices, mobile and on the cloud in real-time;
  • Securing the networks and devices

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.