Posted on
in Presentations
Real-world case studies of advanced modern-day intrusions, including attacks on Linux, IOT and machine-learning evasions. In the typical raw Hacking Exposed style, the session will demonstrate these attacks and provide relevant countermeasures for detection and response. Reprising their appearance again this year are also the must-see Adversary Oscars.
Learning Objectives:
1: Learn about latest attacks happening today and those that are upcoming.
2: Gain insight into new adversary TTPs.
3: Gain a better view into countermeasures that can protect you against these threats.
Learning Objectives:
1: Learn about latest attacks happening today and those that are upcoming.
2: Gain insight into new adversary TTPs.
3: Gain a better view into countermeasures that can protect you against these threats.
Hackers & Threats
cyber espionage hackers & threats intrusion prevention/detection artificial intelligence & machine learning cyber warfare & cyber weapons
Topic
Hackers & Threats
Subtopic
cyber espionage
hackers & threats
intrusion prevention/detection
artificial intelligence & machine learning
cyber warfare & cyber weapons
Share With Your Community