InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Inside the Threat: Secureworks CTU Analysis | Episode 3: Understanding AitM Tactics and Credential Theft

Presented by

Rafe Pilling, Director of Threat Intelligence, CTU Threat Research, Secureworks

About this talk

Join Secureworks® CTU™ experts for an in-depth exploration of "Understanding Adversary in the Middle (AitM) Tactics and Credential Theft," a crucial topic for anyone concerned with protecting remote access solutions or SaaS applications. This webinar will unravel the complexities of AitM attacks, a sophisticated method used by threat actors to intercept and steal user credentials or tokens. We will delve into the mechanics of these attacks, highlight real-world examples, and examine the tools and technologies employed by attackers. Additionally, we'll discuss effective strategies for detection, prevention, and response, providing practical advice to safeguard your organization. Don't miss this opportunity to enhance your understanding and fortify your defenses against one of the most insidious threats in the digital landscape. In this informational webinar, you will: · Gain insights into what AitM attacks are and why you need to watch out for these type of attacks · Discover the various types of AitM attacks and how they work · Learn how to protect your organization from AitM attacks
Secureworks

Secureworks

20337 subscribers119 talks
Built by Security Experts, for Security Experts
We help protect organisations from today’s most pervasive cybersecurity threats. With us on your team, you’ll rest easy knowing your mission-critical assets are safe from threat actors.
Related topics