Cybersecurity Peer Group | Malicious or Malformed?jordan2019-11-07T19:24:49+00:00
Malicious or Malformed? Effective Software Analysis in Incident Response
With Sara Quesada, Louis Allen, and Nick Murietta
How do you handle information security alerts when produced by trusted third parties? When trust is established between organizations, it often leads to security staff questioning their security tools instead of the third party. Join members of PNM’s cybersecurity team as they discuss the handling of security events when they involve software from trusted vendors and alerts raised with various next-generation security tools.