Hollywood and the popular press would have us believe that hacking an enterprise network is the stuff of brain surgeons and rocket scientists, but some of the highest profile breaches of the past few years have been executed by relatively basic, widely-available techniques. In this webinar, we’ll walk through some examples of brand-name breaches at a high level and discuss how comparatively straightforward attack vectors were responsible for the theft of mountains of sensitive data. Then, we’ll dissect one high-profile breach in particular, and demonstrate how quickly and easily the successful attack was executed. Join us for this eye-opening peek into the world of today’s threat actors, and a practical discussion of how to counter their attacks.
April 30, 2020