

It was a full on monopoly that kept raising prices to squeeze PC makers, who had to live on paper thin margins. Intel he left behind was not paranoid at all.

He narrowed the business focus to high margin processors. But he left Intel in a poor shape and poor hands. He made his name preaching that "only the paranoid survive". Who would have thunk it?Īndy Grove was a management Guru besides being the CEO of Intel. Participants will also be provided with free tools that can be used to simulate real-world attacks in their own M365 and Azure AD environments. In this exercise, participants will sharpen their cyber defense and threat hunting skills by experiencing first-hand how to detect and respond to attacks in a simulated enterprise environment running 365 and Azure. For those who wish to attend this part of the event, it is a hands-on workshop and laptops are required. This session will provide a technical overview of Vectra’s AI-driven threat detection platform along with hands-on experience using Vectra’s platform to identify threats in Microsoft M365 and Azure environments. Join IMP Solutions & Vectra on June 6 in Newfoundland and June 8 in Halifax and learn more about what organizations are doing to help discover threats in their environments and how they are securing their environments against attackers.Ĭome to our Bacon & Breakfast session to discover how business leaders are managing in a world where there are constant pressures on security teams and the everchanging problem of “more.” More technologies, more threats, more tools to manage… In a world where leaders are facing a never-ending onslaught of “more” with constrained resources, how do we ensure that our environments stay secure while not overloading our security teams?Īfterwards, we will be running a Blue Team workshop. Did you know that 72% of security leaders believe they may be breached but don’t know it?
