Exploitation Tools, Techniques and Protocols You Need to Know

Security teams need to constantly ask themselves three basic questions that illustrate how effective their strategies are: What do I know about my enemy? What does my enemy know about me? What do I know about myself?

During this webinar, we explore these three questions using examples of:

  • Tools, techniques, and protocols cybercriminals use to exploit lackluster security teams
  • How attack surfaces extend well beyond employees and assets under company control
  • Details security teams often overlook and questions they don’t think to ask themselves
  • Recent leaked databases and admin credentials for sale, offering hackers unlimited access to corporate systems


Etay Maor, Chief Security Officer, IntSights