Training

Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

Cyber Weapons of 2015: Know Your Enemy (Because They Know You)

Cyber Weapons of 2015: Know Your Enemy (Because They Know You)

Island hopping techniques used by cybercriminals are becoming much more sophisticated. There has been a serious paradigm shift of cybercriminals to colonise our ecosystems. How are hackers targeting trusted third parties to bypass the perimeter defenses of the intended targets? Attendees will gain knowledge of the tactical shifts used by the cybercriminal underground that can be used to manage and defend the infestation of trusted user and customer accounts within their own organisations.

Background

This session will review the growing sophistication of island hopping techniques used by cybercriminals and explain this serious paradigm shift of cybercriminals to colonise our ecosystems. Learn how to:

  • Identify potential signs of cybercriminals in your network
  • Integrate actionable and relevant threat intelligence into your organisation
  • Understand how virtual patching reduces overall risk to your organisation as well as 3rd parties
  • Understand how attack surface will increase due to mobile malware including exploit kits

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.