Governance & Risk Management , Next-Generation Technologies & Secure Development
Dissecting the Latest Security Attacks
Sophisticated, new cyberattacks are employing a range of techniques that make them invisible to traditional security controls. For example, just when you think you've trained your users not to click on links from untrusted sources, an unsuspecting user visiting a compromised site can fall victim to the latest strain of ransomware - without having interacted with the site at all.
Threats are constantly evolving, from their initial delivery mechanisms to their actual malware payloads, and we've been taking them apart in order to show you how to stop them.
This session showcases recent attacks and discuss what you need to know to mitigate the risk and protect your users. You will learn:
- Real-time demo of how cybercriminals execute an attack
- Innovative techniques hackers are using in today's threat landscape
- Best practices and security recommendations to defend against multistage attacks