Posted on
in Presentations
This co-speaker session will lead the audience on an exploration of motivations behind breaches and what actually happens to the money that nefarious actors gain by exploiting compromised credentials. It is common knowledge that compromised credentials are responsible for the majority of high impact breaches. A realm that is less known is what do the bad guys actually do with this money.
Pre-Requisites: General interest in Cyber Security
Pre-Requisites: General interest in Cyber Security
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community