Posted on
in Presentations
Cybercrime is constantly evolving like any public organization, innovative thinking, experts and talents hiring—all the things you expect in a large organization but with a different path: to achieve profitability. This session will deep dive into underground roles and structures and how they operate, and then review major cyber-incidents and look how the underground roles took part in the incidents.
Pre-Requisites:
Should have one to two years’ security experience. Focused on principles and concepts that would appeal to attendees with more than five years of experience. Little, if any, time is spent on definitional terms and concepts. Contains instructive demos, management tools, deep process discussions or similar level of content.
Pre-Requisites:
Should have one to two years’ security experience. Focused on principles and concepts that would appeal to attendees with more than five years of experience. Little, if any, time is spent on definitional terms and concepts. Contains instructive demos, management tools, deep process discussions or similar level of content.
Participants
Maya Horowitz
Participant
Director, Threat Intelligence & Research, Check Point Software Technologies Ltd.
Oded Vanunu
Participant
Head of Products Vulnerability Research, Check Point Software Technologies Ltd.
Share With Your Community