У нас вы можете посмотреть бесплатно Stop Breaches Before They Start: Finding the Misconfigurations Attackers Exploit или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
One misconfiguration away from a really bad day. 😬 How many breaches have you seen that came down to a forgotten admin account, a mystery firewall rule, or a quiet default setting that nobody ever touched? The reality is simple: most environments are full of configuration drift, and attackers are counting on it. In this Simply Cyber Firesides episode, host Gerald Auger, Ph.D. sits down with Yuriy Tsibere, Product Manager at ThreatLocker, to talk about a very focused problem – and a very interesting approach to solving it. Yuriy joined ThreatLocker in 2024 after 16+ years in technology and product leadership. He now works on Defense Against Configurations (DAC), a dashboard built to help security teams actually see, understand, and prioritize misconfigurations across their environment. 🔎 We will explore: The misconfiguration problem Why so many attacks start with simple configuration mistakes The most common and dangerous misconfigurations Yuriy is seeing in the field Why manual auditing at scale is basically impossible today 🛡 What DAC is and how it works How DAC runs directly in the ThreatLocker agent How it differs from traditional vulnerability or configuration - management tools How it turns raw configuration data into actionable, prioritized findings 💻 Big platform news, beyond Windows: DAC expanding to Mac and Linux Timeline and roadmap for cross platform support Real world challenges in bringing consistent configuration visibility to different operating systems 🐧 Deep dive on the Linux agent and eBPF Why ThreatLocker is moving from loaded kernel modules to eBPF Limitations they were hitting before What eBPF unlocks for security teams on Linux hosts 📋 Compliance and practical workflows: How DAC maps findings to frameworks like NIST, Essential 8, CIS, HIPAA, ISO 27001, FedRAMP What you actually see when you enable DAC as a security team lead How to prioritize what to fix first without losing your mind 🔭 Looking ahead: Yuriy’s vision for where DAC is going next Practical advice for teams drowning in misconfigurations that want a more proactive approach 💬 Live Q&A: Simply Cyber Firesides is all about leveling up practitioners. Bring your questions and drop them in chat during the stream - we will answer as many as we can live. 📌 Who should watch - especially useful for: Security engineers and blue teamers SOC and IR leads GRC and compliance professionals MSPs and MSSPs managing many customer environments Connect with Yuri on LinkedIn: / yuriytsibere Learn more about ThreatLocker: https://threatlocker.com/dailycyber 👍 Subscribe to Simply Cyber for more practitioner focused content and hit the bell so you don't miss future SC Firesides episodes! All the things Simply Cyber: https://simplycyber.io/socials