Day One: Wednesday, August 21, 2019
Wednesday, August 21st, 2019
11:30 AM Chairperson's Opening Remarks
Reactive and proactive security methods do not have to be mutually exclusive — we must plan how to respond when an intrusion does occur, whether it comes from worms and viruses, DDOS attacks, social engineering or even from disgruntled employees with insider knowledge of the network. For comprehensive defense, a reactive security strategy should be paired with a proactive strategy and effective tools for uncovering, identifying, and responding to potential threats before they have the chance to damage a company. Every business needs to decide the appropriate mix of resources to devote to proactive security measures (to deter attacks), and reactive measures (to respond to attacks that get through).