VP of Solutions Engineer ThreatLocker, United States
In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. This session will cover the anatomy of several types of malware and other attacks. Starting from a default-deny posture, then learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.