Session Video
About this session
This session will focus on multiple ways we can implement Positive Security models and how Rebuilding into a “Known Good” state scales.session
During the session we will cover areas where these patterns can be applied:
- Source code
- Files with business content (Documents, Spreadsheets, Presentations, Pdfs, Images)
- DevSecOps
- Config files
- Cloud Environments
- Network Traffic