Analyze Exfiltration Pathing: Identify common modern methods of data exfiltration, such as social engineering, session hijacking (cookies), and the use of authorized software for malicious purposes.
Evaluate Application Permissions: Understand the risk associated with the "Full Access" model, where any software opened by a user can access everything that user has permission to see.
Implement Granular Controls: Learn to apply Zero Trust principles by using storage control policies to restrict data access to only pre-approved, necessary applications.
This segment is sponsored by Zero Trust World. Visit https://securityweekly.com/ztw to see all of our coverage of this event!
With over 20 years of experience in network engineering, cybersecurity, and IT solutions, Cristiano has a proven track record of delivering innovative, high-impact solutions across multiple domains and industries.
He began his career at the Italian Ministry of Telecommunications and later contributed to Telecom Italia Network’s Security and Network Operations Centers. After gaining international experience in Ireland with Virtual Access Ireland and Interop Technologies, Cristiano advanced to Director of Solution Engineering at Ubiqube, managing global teams in automation and integration.
Currently, as a Solutions Engineer at ThreatLocker, Cristiano focuses on endpoint security, specializing in application whitelisting and threat prevention. His expertise helps businesses protect against ransomware, viruses, and other software-based threats through simple, effective security solutions.








