This track explores the role of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) in identifying and mitigating cyber threats. These systems monitor network and system activities to detect malicious behavior and prevent unauthorized access.
Participants will learn about different types of IDS/IPS, including network-based and host-based systems, along with their deployment strategies. The track covers signature-based and anomaly-based detection techniques used to identify potential threats.
The sessions will also highlight best practices for integrating IDS/IPS into cloud environments and maintaining their effectiveness. Attendees will gain insights into building proactive security defenses that detect and respond to threats before they impact systems.