InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Access Denied: Detecting and Defeating Initial Access Brokers

Presented by

Christiaan Beek, Sr. Director of Threat Intelligence and Analytics, Rapid7 | Antony Parks, Threat Intelligence Researcher, Rapid7

About this talk

Initial Access Brokers (IABs) are a key player in the supply chains of many of today’s most disruptive threat actors, including ransomware groups. That’s because the IAB’s business model thrives on gaining access and then reselling that access to threat actors looking to bypass the effort of initial intrusion so they can cut straight to victimization. It’s a seemingly endless cycle of one-two punches for organizations big and small, in every business sector, around the world. So what can you do to ensure your organization’s network doesn’t appear in one of these IAB listings? Join Rapid7’s Christiaan Beek, Sr. Director of Threat Intelligence and Analytics, and Antony Parks, Threat Intelligence Researcher, as they take a deep dive into the key findings and insights from our recently published Rapid7 Access Brokers Report. In this session, Christiaan and Antony will discuss trends they are seeing in the way access brokers and their buyers operate, as well as innovations in the way threat intelligence is being leveraged to counter the IAB threat.
Rapid7

Rapid7

81961 subscribers717 talks
Supercharge Your Security Impact
Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure to the dark web. We foster open source communities and cutting-edge research–using these insights to optimize our products and arm the global security community with the latest in attackers methods. Trusted by more than 10,000 customers worldwide, our industry-leading solutions and services help businesses stay ahead of attackers, ahead of the competition, and future-ready for what’s next.
Related topics