Building Effective Cyberdefense Strategies against Privileged Attacks (BeyondTrust)

  1. Moscone North

The daily newsfeed continues to be littered with tales of new cyberattacks. Central to most of these stories is an element of privilege abuse or misuse. Based on strategies developed by BeyondTrust and presented in the book Privileged Attack Vectors, you will learn how privileges, passwords, and vulnerabilities are leveraged as attack vectors, and the steps you can take to mitigate these threats.