Cybersecurity Showcase Ep. III: Verizon's Threat and Vulnerability Portfolio

Presented by

Kevin Horvath, Verizon

About this talk

The number of security threats and vulnerabilities has exploded in recent years. Businesses must identify potential vulnerabilities and be proactive in assessing cyber threats and addressing any security gaps. Traditionally, these security vulnerabilities were detected using a computer program known as a vulnerability scanner, which scans networks, assets and applications for known weaknesses. But, in many cases, organizations may have complex vulnerabilities in their applications and business infrastructure that scanning tools alone can’t discover and more comprehensive assessment services are needed. Additionally, many organizations want to identify what TTPs (Tactics, Techniques, and Procedures) are used by sophisticated threat actors to compromise networks in various ways after the initial foothold has been obtained. Many times the traditional exploitation of a vulnerability via a missing security patch isn’t the only or primary means to gain the initial foothold, but leveraging misconfigurations or abusing protocols and other means can be used. This webinar will focus on how to position and sell three of Verizon’s Threat & Vulnerability assessment services: • Penetration Testing: Uses manual testing and advanced exploitation techniques to assess a customer's environment for various types of vulnerabilities and attempts various types of post-exploitation activities to measure the danger those weaknesses may cause, so they can prepare before an attack occurs. • Red Team Operations: Implements simulated sophisticated covert attacks to gauge the effectiveness of the customer’s defensive capabilities in terms of threat detection, response, and containment. It also serves as training exercises for defensive teams. • Ransomware Attack Simulation: Tests the current state of processes and technical aspects of company defenses and identifies measures they can take to prepare for a Ransomware attack.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (484)
Subscribers (61145)
We deliver the promise of the connected world. In today’s rapidly transforming environment, we integrate, secure and operate the networks, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity. Our solutions across Connectivity, Security and Advanced Business Communications are designed to help enterprises pursue new possibilities and create entirely new revenue streams – more efficiently than ever.