The Five Most Dangerous New Attack Techniques and How to Counter Them

The Five Most Dangerous New Attack Techniques and How to Counter Them

Which are the most dangerous new attack techniques? How do they work? How can you stop them? What's coming next and how can you prepare?

This fast-paced briefing features the three people best positioned to provide answers and best able to communicate them:

  • the nation's top expert/teacher on mobile forensics
  • the director of the Internet Storm Center
  • the top hacker exploits expert/teacher in the US

They also answer audience questions.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.