Why Hackers Hack: The Hoodie

Logo
Presented by

Kelvin Murray, Senior Threat Researcher @ Webroot

About this talk

While it’s easy to imagine a black-hat hacker as a hoodie-clad loner coding away in a dark room, this is seldom the case. Many operate in groups or even as part of larger communities or networks, and they often use the same techniques, strategies, and tools to accomplish their ends. Hackers are coordinated and work within a broad and complex network. They often have salaries, set holidays, bonus payments and sales arrangements that include reseller portals and component rental. The only prerequisite for becoming a target is simply having a website, which puts all businesses with an online presence at risk. Fortunately, threat awareness and a proactive approach to security can go a long way in keeping your business secure. Join Kelvin Murray, Webroot Senior Threat Researcher, to learn why hackers hack and the methods they use so you can predict incoming threats, combat attacks, and securely lock down your business. Key takeaways: · Understand the major motivations behind why hackers hack · Learn the strategies, tricks, and tools that hackers use to breach a business and which matter most for different business types · Find out how to keep your business safe from becoming a target Register Now!
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (187)
Subscribers (64014)
OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. From prevention to detection and response, to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Powered by actionable insights from our real-time contextual threat intelligence, OpenText Cybersecurity customers benefit from high efficacy products, a compliant experience, and simplified security to help manage business risk. Discover cyber resilience at carbonite.com and webroot.com.