Exploitation Tools, Techniques and Protocols You Need to Know
Security teams need to constantly ask themselves three basic questions that illustrate how effective their strategies are: What do I know about my enemy? What does my enemy know about me? What do I know about myself?
During this webinar, we explore these three questions using examples of:
- Tools, techniques, and protocols cybercriminals use to exploit lackluster security teams
- How attack surfaces extend well beyond employees and assets under company control
- Details security teams often overlook and questions they don’t think to ask themselves
- Recent leaked databases and admin credentials for sale, offering hackers unlimited access to corporate systems
Etay Maor, Chief Security Officer, IntSights