Initial Compromise: How Attackers Break in

About this webinar

Recorded: June 4, 2018

Today, hacking tools are so easy to find and use that attackers no longer need specialised skills and knowledge; they simply deploy the tool of their choice. As a result, attacks are more frequent than ever, and it’s critical for internal information technology and security teams to spot them quickly. The key to protecting your environment is knowing what types of attacks to look for.

In this webinar, you will learn:

  • What common attack methods can be used to compromise a network, server or device
  • How to identify the threats to your information security space
  • How to mitigate the risk of the attacks
  • What tools can help you to identify attacks
Hosted by
Liam Cleary,
Office Apps and Services MVP
Vijay Sharma,
Systems Engineer

Pro Tips for Defending Your Organization from Data Breaches

Data security analyst Bob Diachenko (@MayhemDayOne) will join us in this webinar to share his expert tips for reducing your risk of a data breach. To discover data leaks and vulnerabilities on the internet, Bob uses search engines like Shodan, BinaryEdge and Zoomeye, and simple dorks. No special software or active scanning, just 'bare hands' and some luck. If he can find your data, then anybody else in the world can, too.

Bob will provide some great insights based on recent data breaches in unsecured NoSQL databases caused by trusted staff and partners, including:

  • Which of your data assets are likely to be targeted by attackers
  • A checklist for minimizing the risk of a data breach
  • How to spot and remediate risks while adopting a cloud-first strategy
  • How to minimize the exposure of your sensitive data
24
October
1:00pm EDT
24 October, 1:00pm EDT
Register Now