How to Shut Down a Phishing Attack at the Beginning of the Cyber Kill Chain
More of your attack surface resides on web infrastructure you don’t own or control. To protect your digital assets and thwart malicious lookalikes on everything from social networks to criminal marketplaces, you must shift security priorities from prevention to detection and remediation. This session will outline tools, tactics and best practices to safeguard your entire digital footprint.
- Understand why security priorities must shift from prevention to active detection and remediation.
- Understand how to align activities to three core steps of digital risk protection: map, monitor and mitigate.
- Take away practical tools and techniques, like sample classifications and decision-tree diagrams.