Posted on
in Presentations
Cybercriminals are constantly evolving their tactics. In this session, we'll show how attackers sidestep endpoints through real-life attack scenarios like creating malicious Microsoft 365 apps, exploiting vulnerable remote access gateways, and compromising the software supply chain. We'll dive into exactly how these attacks are carried out and give strategies to better defend against them.
Access this and other Conference presentations with your free RSAC™ Membership. Your Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with peers and experts, and more.
Share With Your Community