Detecting and Responding to Advanced Threats within Exchange Environments


Posted on in Presentations

This presentation will cover how and why APT actors are leveraging the Microsoft Exchange environments of victim organizations to conduct cyberespionage operations. Key areas of focus are how attackers are leveraging Microsoft Exchange to exfiltrate data and maintain access to an organization’s network and employee emails. Each attacker technique will then be coupled with a method of detection.
Participants
Steven Adair

Participant

President, Volexity


Share With Your Community