InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Open Doors and Lost Keys: Gaining visibility across your external attack surface

Presented by

Todd Carroll, CISO & SVP Global Cyber Operations at CybelAngel

About this talk

Remember the Colonial Pipeline attack? A $2.4M ransom attack disrupted fuel supplies from one of the largest pipeline operators in the United States—all because of an exposed password (lost key) and a publicly-accessible VPN (open door). A tiny overlooked detail led to massive consequences for both the company and millions of people who rely on their fuel supplies. Join Todd Carroll, CISO & SVP Global Cyber Operations at CybelAngel, to see real-life examples of how shadow assets, lost credentials and fake websites can easily add up to costly attacks. Discover how you can regain full visibility across your extended digital footprint and be proactive with External Attack Surface Management (EASM). In this presentation, you will learn to: - Understand the threats caused by unsanctioned digital assets in your supply chain - See your digital footprint through the eyes of attackers - Spot opportunities to reduce and defend your external attack surface
CybelAngel

CybelAngel

1991 subscribers37 talks
Data leaks are inevitable. Damage is optional.
CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies available. Built upon close to a decade of machine learning, our advanced platform scans the entirety of the internet every 24 hours to uncover unknown assets and shadow IT, cloud services, connected devices, fraudulent domains and exposed credentials — the sources attackers use to access confidential data, launch phishing campaigns or initiate destructive ransomware attacks. CybelAngel's combination of machine learning and expert human analysis provides deep visibility into the most critical threats, long before they’re exploited.
Related topics