If there is a weakness in your IT security system, wouldn’t it be better to find it before someone else does? Why don’t we get into the hacker’s role and perform all the activities they would do?
Speaker

If there is a weakness in your IT security system, wouldn’t it be better to find it before someone else does? Why don’t we get into the hacker’s role and perform all the activities they would do?
This document was retrieved from http://www.rsaconference.com/videos/hackers-perspective-on-your-windows-infrastructure-mandatory-check-list on Fri, 22 Feb 2019 11:47:40 -0500.