Architecting for Large Scale Deployments
- Risk-based Vulnerability Management
- Tenable Vulnerability Management
- Tenable Security Center
- Tenable Security Center Plus
- Tenable Lumin
Build Your Risk-Based Vulnerability Management Program with a Proven Process. Let's get started.
Attend this webinar and find out about advanced concepts for Tenable.io and Tenable.sc within your organisation to better address your Risk-based Vulnerability Management requirements.
Topics covered will include:
- Deployment considerations at scale
- Hybrid environments (T.io + T.sc)
- Cloud connectors
We will be allowing time at the end of the session for Q&A with Security Engineers from the A&NZ Region.
Adam is a Security Engineer, based in Melbourne, with extensive experience in security architecture, design, consultancy and implementation across a wide range of technology domains. His career in ICT and security spans over 20+ years and has enabled him to work with a broad range of customers, across a wide range of diverse technologies, in both as an individual contributor role and in an advisory capacity.
Adam began his career in Security back in 2011 when he was employed as part of the Professional Services team for Trend Micro. Over time, he moved across to Pre-Sales therefore he has great understanding, when interacting with customers in a post-sales capacity as well as a pre-sales aspect.
Adam is a Certified Information Systems Security Professional and an AWS Certified Solutions Architect, he takes pride in his professional development and ensures that he keeps up with the latest technology and industry initiatives. He also recently obtained a Graduate Certificate of Cybersecurity at Charles Sturt University, with a focus to achieve his Masters in the coming years.
Richard has worked in the Australian IT industry for 30 years and focused on IT security for more than 20 years. Richard is an experienced technical practitioner and has held positions with global vendors and service providers. He is experienced in several aspects of IT security including; security management practices, network security, security architecture, operations security, and systems security. Having held his Certified Information Security Systems Professional certification (CISSP) since 2004 he enjoys being part of the Australian IT security community. Richard has been involved in numerous engagements with major industrial, government and financial customers in the Asia Pacific region. He is able to adapt to his surroundings and feels at home speaking to a room full of engineers or a boardroom full of executives.