Source code audit
Defining policy and process
Security and compliance roadmaps
Security technology and process roadmap
Operationalizing security plans
Incident Response and Forensics
Technology and Process Implementation
Configuration and Policy Optimization
Advanced Adversary Protection
Endpoint Security Lifecycle
Active Vulnerability Control
Perimeter defense and Intelligence driven SIEM
A heightened level of detection and defense against the most sophisticated type of security threats – those that come from an Advanced Adversary.
Illuminating the Black Art of Security. Now entering its 11th year, SecTor has built a reputation of bringing together experts from around the world to share their latest research and techniques involving underground threats and corporate defences. The conference provides an unmatched opportunity for IT Professionals and Managers to connect with their peers and learn from their mentors.