In today’s cybercriminal world, the perception of attacker capability is vastly different from the reality of what organisations are having to defend against. Furthermore, an understanding of what attackers are after, why and how they monetize stolen or compromised assets, serves as one of the key factors in better understanding how current defenses and security processes, tools and frameworks, stack up, against the latest techniques available to the cybercriminal elite.
Join this webinar to learn:
How the three main attacks classes have evolved over the decades
What tools, techniques and procedures cybercriminals use today, with a deeper dive view of the cybercriminal economy that allows instant monetization of stolen or compromised business assets
What the most popular tools used today are and provide insights into a concerning (but rapidly growing) trend in attacker automation, with levels of sophistication akin to the capabilities of nation state groups
How to build an effective security testing programme in response to these changing trends and capabilities by the adversary and how to disrupt the attacker
Through the employment of your own sophisticated security functions and frameworks, to help originations change the game in what has become an adversarial golden age for cybercriminals across the world