Initial Compromise: How Attackers Break in

About this webinar

Recorded: May 31, 2018

Today, hacking tools are so easy to find and use that attackers no longer need specialised skills and knowledge; they simply deploy the tool of their choice. As a result, attacks are more frequent than ever, and it’s critical for internal information technology and security teams to spot them quickly. The key to protecting your environment is knowing what types of attacks to look for.

In this webinar, you will learn:

  • What common attack methods can be used to compromise a network, server or device
  • How to identify the threats to your information security space
  • How to mitigate the risk of the attacks
  • What tools can help you to identify attacks
Hosted by
Liam Cleary,
Office Apps and Services MVP
Kennet Johansen ,
Solutions Engineer

How Attackers Exploit Office 365 Vulnerabilities

Office 365 has become the platform of choice for document collaboration and sharing. If you're using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy.

In this webinar, you'll discover:

  • Unconventional Office 365 attack techniques
  • How to test your end users
  • How to spot attacks in early stages so you can take steps to prevent a breach
  • How you can keep your executives mailboxes safe
17
October
1:00pm EDT
17 October, 1:00pm EDT
Register Now