Posted on
in Presentations
There seems to be an impression that detecting advanced attacker techniques has to involve a full re-architecture of your network and hundreds of thousands of dollars. This is just not true. This presentation will cover new attack tools and endpoint bypass techniques and free techniques to detect them. Come for the new “hacks.” Stay for the detection techniques!
Learning Objectives:
1: See advanced attacks.
2: Learn about little known attack vectors.
3: Gain access to free tools.
Hackers & Threats Analytics Intelligence & Response
security architecture risk & vulnerability assessment incident response hackers & threats artificial intelligence & machine learning
Topic
Hackers & Threats
Analytics Intelligence & Response
Subtopic
security architecture
risk & vulnerability assessment
incident response
hackers & threats
artificial intelligence & machine learning
Share With Your Community