Cybercrime , Cybercrime as-a-service , Events

The 5 Most Dangerous New Attack Techniques

SANS Technology Institute President Ed Skoudis on Ever-Changing Attack Surface
Ed Skoudis, president, SANS Technology Institute College

The COVID-19 pandemic brought about notable shifts in technology and cybersecurity. It also widened the attack surface, making it bigger than ever before. This change is driven by factors such as hybrid workplaces, cloud migration and SaaS dependencies.

See Also: Ransomware Response Essential: Fixing Initial Access Vector

Visibility is a major concern due to rapid cloud migration, according to Ed Skoudis, president of the SANS Technology Institute College and a presenter in the "Five Most Dangerous New Attack Techniques" RSA session. "The cloud has great promise to give more visibility, but there are actually relatively fewer skilled people to do detailed analysis and threat hunting forensics in the cloud," he said.

In this video interview with Information Security Media Group at RSA Conference 2023, Skoudis also discusses:

  • The state of cyberthreat intelligence and ways to improve it;
  • Securing cross-platform environments;
  • Staying vigilant about potential attack techniques.

Skoudis has expertise in penetration testing and incident handling. He is the founder of the SANS Penetration Testing Curriculum, the founder of the Counter Hack consulting firm, and the leader of the team that builds SANS NetWars and the SANS Holiday Hack Challenge. Skoudis also is a keynote speaker and an advisory board member for RSA Conference.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.