Nairobi Chapter – August 26th 2021

0Days0Hours0Minutes0Seconds

Chapter Overview

Date: Thursday, 26th of August 2021

Time: 15.00 – 16.30 (EAT)

Platform: Digital Alliances

Location: Digital Alliances – Microsoft Teams Link – Invite Only

Overall Theme: Relentless Breach Defence – Endpoint Protection, Detection and Response

  • 1500

    Welcome Remarks & Joining Time

  • 1510

    Focused Session

    Session Leader: Moneim Yehia, Cyber Security Systems Engineer – Cisco

    Session Title: “Relentless Breach Defence – Endpoint Protection, Detection and Response”

    Session Synopsis:

    The way we work has fundamentally changed since the beginning of last year. We are now part of a new, massively remote workforce that is here to stay. Organizations have long struggled with maintaining visibility across an increasingly complex attack surface. Now, with more employees relying on access to resources and applications from outside the office, endpoint protection has become crucial to the success of any cybersecurity program. But finding success in cybersecurity doesn’t come easy, especially in such a fragmented market with thousands of solutions and vendors to choose from.

    Endpoint is a magnet to Threat Actors. We see ransomware gang attacks as well as their demands skyrocket at breath-taking speed. In most cases they succeed where the advanced modern tools aren’t in place.

    So, what if you could gauge how the capabilities of a endpoint security solution would contribute to achieving your business targets? What if you could measure the impact of deploying a specific tool to determine whether it can simplify complexity, minimize your attack surface, and accelerate threat response?

    What are essential endpoint security prevention, detection, and response capabilities for today’s cloud-focused era?

    Join us to find out as we take a deep dive into how endpoint security toolsets are stacking up against the latest threats.

    Takeaway:

    – At the end of this session you will be armed with knowledge of the type of toolsets available in defending your organization from threats and against advanced adversaries.

    – By doing so you will understand how to successfully navigate today’s top endpoint security challenges.

    – How to free your analysts/administrators  from the mundane day to day threat hunting tasks

  • 1550

    Debate & Questions

  • 1625

    Action Areas and Next Steps