Cybercriminals are constantly evolving their tactics. In this session, we'll show how attackers sidestep endpoints through real-life attack scenarios like creating malicious Microsoft 365 apps, exploiting vulnerable remote access gateways, and compromising the software supply chain. We'll dive into exactly how these attacks are carried out and give strategies to better defend against them.
Hackers & Threats
data security endpoint security hackers & threats incident response threat intelligence
Share With Your Community