Posted on
in Presentations
This presentation will cover how and why APT actors are leveraging the Microsoft Exchange environments of victim organizations to conduct cyberespionage operations. Key areas of focus are how attackers are leveraging Microsoft Exchange to exfiltrate data and maintain access to an organization’s network and employee emails. Each attacker technique will then be coupled with a method of detection.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community