Goldilock: Physically Segmenting Computer Networks
Physically Segmenting Computer Networks
- Significantly Reduce Your Attack Surface:
- By physically isolating assets and networks, you drastically limit the potential entry points for malicious actors, making your systems far less vulnerable to attack.
- Physically Segment and Isolate Assets:
- Create true airgaps that protect your most sensitive systems from unauthorized access, even without an internet connection.
- Achieve Granular Control:
- Disconnect and isolate individual network segments or endpoints with precision and ease.
- Respond Instantly to Threats:
-
Quickly and remotely isolate compromised systems, preventing the spread of attacks and minimizing damage.
Date and Time
Location
Hosts
Registration
- Date: 06 Aug 2024
- Time: 06:00 PM to 07:00 PM
- All times are (UTC-04:00) Eastern Time (US & Canada)
- Add Event to Calendar
- Starts 03 August 2024 07:45 AM
- Ends 06 August 2024 04:00 PM
- All times are (UTC-04:00) Eastern Time (US & Canada)
- No Admission Charge
Speakers
Michael Vallas
Goldilocks Firebreak Technology
Goldilocks' FireBreak is a cybersecurity appliance developed in conjunction with NATO that provides unparalleled Layer 1 physical isolation protection for your critical digital assets and networks. It is not a replacement for existing cybersecurity tools; it's a complementary solution that enhances their effectiveness with layers and depth. While traditional cybersecurity tools are essential, they often leave gaps in protection that can be exploited by determined adversaries
Biography:
Jacob Myers of Goldilock
Goldilocks FireBreak Technology
Goldilocks' FireBreak is a cybersecurity appliance developed in conjunction with NATO that provides unparalleled Layer 1 physical isolation protection for your critical digital assets and networks. It is not a replacement for existing cybersecurity tools; it's a complementary solution that enhances their effectiveness with layers and depth. While traditional cybersecurity tools are essential, they often leave gaps in protection that can be exploited by determined adversaries
Biography:
Agenda
6:00 pm - Introductions
6:05 pm - start of main technical talk
6:50 pm - end of talk, start Q&A
7:00 pm - Conclusion of virtual event.
It started as a kill switch and now is a new way to protect your networks
Media
GLODILOCK - Flyer | GLODILOCK - Flyer | 345.37 KiB |