Preview of Defense-In-Depth Presentation at 2018 Global Summit
By Jason Borinski and Cooper Nelson (University of California - San Diego)
Thirty years ago, the Morris Internet Worm was released and ushered with it the birth of the Internet security industry.
What started as perimeter security, firewalls, and honey pots has since evolved to include “next generation” products, intrusion detection/prevention, managed SOC, deception networks, and most recently a shift towards endpoint and identity technologies.
There continues to be raging debate over in-sourcing vs. outsourcing, default permit vs. default deny, and open vs. closed source. Should detection/deflection be on the endpoint or network? Should we build or outsource the SOC? Answers to these questions and more during our presentation at Global Summit next week!
Join us on Monday, May 7 at 10:30 a.m. to hear the perspective of two security operations veterans with over 30 years of combined experience acquired in managing security for one of San Diego's largest IP networks.