Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats

Logo
Presented by

Stevan Sheely, Technical Solutions Architect, Cisco

About this talk

The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a methodology that most security practitioners know well. Fast forward to the present day where the security stack is more flexible to adapt to the borderless perimeter of most orgs – it’s fair to state that we’ve learned to architect these controls to adapt to the shift in the security landscape. Join presenter Stevan Sheely to take a step back and learn how an attacker would view these controls. Plus, learn how attackers architect ways to bypass these controls. Time to think like the unauthorized actor attempting to penetrate your organization’s security controls What you’ll learn: The thoughtful planning behind breaches – including timing and basic objectives How a malicious attacker looks at security controls What you could possibly be overlooking in the form of basic security controls to help mitigate breaches
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (375)
Subscribers (69250)
Cisco Umbrella provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Our predictive intelligence uses machine learning to automate protection against emergent threats before your organization is attacked. Umbrella protects all your devices globally without hardware to install or software to maintain. Learn more: https://umbrella.cisco.com/