Security Congress Abstract
Effective cybersecurity transcends technology into the organizational, legal and human realms. Despite that, technology is still required. Specifically the hardware, software and services that make up your IT security infrastructure. That’s the sweet spot between “beyond the firewall” and “beyond technology” altogether.
This area is also increasingly crowded with a seemingly unstoppable wave of new products and new vendors. We want “defense in depth” not “defense in duplication,” but how can we be sure? There is so much marketing buzz around so many emerging areas. It’s hard to keep it all straight.
We've created a reference model of IT infrastructure security to combat this and to help us answer a few fundamental questions. Let's explore it and how to put it into practice.