Like the velociraptors in Jurassic Park, cyberattackers always find a way. As defenders tighten their controls, attackers open new fronts, change their attack tactics, and choose their targets to maximize profit and disruption. This webcast will discuss changes in cyberattack tactics, and how defenders can adapt:
- The increase in software supply chain attacks, plus massive growth in vulnerability exploitation as revealed in Verizon DBIR 2024.
- The state of stolen credentials as an attack vector. MFA bypass, MFA fatigue, and more.
- How AI is going to change the cyberattack landscape, and how to get ahead of it.
Join us live. We’ll take questions from the audience throughout, so you can drive the discussion too.