Posted on
in Presentations
How does one defend against threats unseen? Cybercriminals use traffic distribution systems (TDSs) and malicious ad tech to attack victims while hiding behind a complex system of redirects and decoys. Using real-world examples, learn how to detect and defend against this threat vector. Then, put on a black hat and see how easy a TDS is to operate.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community