|
Steve Kenniston Presented for Dell Technologies at Security Field Day 12 |
This Presentation date is October 16, 2024 at 14:00-16:00.
Presenters: Adam Miller, Brian White, Sameer Shaw, Steve Kenniston
Follow on Twitter using the following hashtags or usernames: #XFD12
Dell Technologies Cybersecurity Overview
Watch on YouTube
Watch on Vimeo
In this session we will review Dell’s overall cybersecurity strategy from the ground up starting with our Secure Supply Chain and a review of our key practice areas, Reduce the Attack Surface, Detect and Respond to Cyber Threats and Recover from a Cyberattack to leading with zero trust principles. We will outline how Dell approaches customers to help solve their most critical cybersecurity challenges.
Personnel: Steve Kenniston
Reduce the Attack Surface with Dell Technologies
Watch on YouTube
Watch on Vimeo
During this section we will examine ways to minimize cybersecurity vulnerabilities and entry points. We will discuss strategies, best practices, and how Dell products and services help our customers advance these objectives.
Personnel: Sameer Shah
Detect and Respond to Threats with Dell Technologies
Watch on YouTube
Watch on Vimeo
In this session, Adam Miller will discuss Dell Technologies’ strategy to help customers quickly detect and respond to threats across their organization, exploring what we’re hearing from our customers and how solutions from endpoints to managed services can.
Personnel: Adam Miller
How Dell Technologies Enables Recovery from a Cyberattack
Watch on YouTube
Watch on Vimeo
In this session, Sr. Consultant Brian White will discuss how Dell Technologies helps elevate customers cyber resilience strategy to preserve the confidentiality, integrity, and availability of data to ensure recoverability in the event of a cyberattack.
Personnel: Brian White
Dell’s Cybersecurity Strategy for the Future
Watch on YouTube
Watch on Vimeo
In this wrap up, Steve Kenniston discusses how Dell is building a holistic cybersecurity solution for the future that embraces key technology advantages. Included is a discussion of post-quantum cryptography and how Dell will be implementing these new standards.
Personnel: Steve Kenniston