Inside the Mind of an Ethical Hacker

Presented by

Joseph Carson, Chief Security Scientist at Delinea

About this talk

As more organizations move to the cloud, the cyber security dynamics of a cloud environment and the threats associated with it are rapidly evolving. Join ThycoticCentrify’s Tony Goulding and Joseph Carson as they explain and demonstrate the latest attacker tactics and techniques from the perspective of the criminal hacker. They will share insights into how the mind of a criminal hacker operates based on their experiences and steps you can take to stop them in their tracks. Chief Security Scientist and Ethical Hacker Joseph Carson will demonstrate a real-world use case of how a cyber adversary gains an initial foothold in your network through compromised credentials and then elevates control and moves laterally to identify and exfiltrate your critical data. What will I learn? - How attackers gain access to IT environments and systems and escalate privileges - What a real-world hack looks like in a use-case demonstration - Best practices for combating attackers by establishing multiple layers of security to minimize risk Get answers to these important questions: - How has moving to the cloud affected cyber security from a PAM perspective? - What are the most common types of attacks that criminal hackers use to compromise cloud environments? - What are common misconceptions that lead to cyber security “blind spots” of vulnerability?
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (19)
Subscribers (784)
Delinea (formerly ThycoticCentrify) is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide, including over half of the Fortune 100. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.