Training

Anatomy of an Attack

Anatomy of an Attack

Cybercriminals are increasingly exploiting internet services to build agile and resilient infrastructures, and, consequently, to protect themselves from being exposed and stopped. This session looks at recent attacks and explains how the correlation of internet data from multiple levels - DNS, BGP, ASN and prefixes/IPs - can be used to expose the attackers' infrastructure.

See Also: Preventing an Inside Job: Detection, Technology and People

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.