Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore Dell Technologies' comprehensive cybersecurity strategy in this 40-minute presentation from Security Field Day 13. Learn about their "advanced cybersecurity maturity" approach that embeds security from supply chain through endpoints, infrastructure, and services. Understand how Dell addresses the expanding attack surface in the AI era through three strategic pillars: reducing attack surfaces, detecting and responding to threats, and ensuring rapid recovery. Discover their secure hardware offerings (including commercial and AI PCs), industry partnerships, and Zero Trust-aligned services. Gain insights into Dell's cyber hygiene enforcement practices, AI/ML-enhanced XDR tools, and built-in security features like firmware verification and BIOS-level behavioral detection. See how Dell approaches recovery through air-gapped cyber vaults and comprehensive incident response planning. Learn about their dual approach to Zero Trust implementation: an incremental uplift for existing investments and Fort Zero, a pre-certified private cloud solution aligned with DoD architecture. Presented by Steve Kenniston, Sameer Shah, and Adam Miller, this session frames cybersecurity as a continual improvement process supported by practical frameworks, technology, and Dell's ecosystem of services and partners.
Syllabus
Dell Technologies Security Strategy Overview
Taught by
Tech Field Day