The Five Most Dangerous New Attack Techniques and How to Counter Them
Alan Paller, Research Director and Founder, SANS Institute
Heather Mahalik, Director of Forensics Engineering at ManTech and Mobile Forensics Course Director, SANS Institute
Ed Skoudis, Instructor, SANS Institute
Johannes Ullrich, Dean of Research, SANS Technology Institute
Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare? This fast-paced briefing features the three people best positioned to provide answers and best able to communicate them: the nation’s top expert/teacher on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert/teacher in the US. They also answer audience questions.
Видео The Five Most Dangerous New Attack Techniques and How to Counter Them канала RSA Conference
Heather Mahalik, Director of Forensics Engineering at ManTech and Mobile Forensics Course Director, SANS Institute
Ed Skoudis, Instructor, SANS Institute
Johannes Ullrich, Dean of Research, SANS Technology Institute
Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare? This fast-paced briefing features the three people best positioned to provide answers and best able to communicate them: the nation’s top expert/teacher on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert/teacher in the US. They also answer audience questions.
Видео The Five Most Dangerous New Attack Techniques and How to Counter Them канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![The 5 Most Dangerous New Attack Techniques and How to Counter Them](https://i.ytimg.com/vi/xz7IFVJf3Lk/default.jpg)
![Network Security 101: Full Workshop](https://i.ytimg.com/vi/E03gh1huvW4/default.jpg)
![A View from the Front Lines of Cybersecurity](https://i.ytimg.com/vi/7EH7ehAY3_w/default.jpg)
![Bruce Schneier and Edward Snowden @ Harvard Data Privacy Symposium 1/23/15](https://i.ytimg.com/vi/7Ui3tLbzIgQ/default.jpg)
![Think and Act Like a Hacker to Protect Your Company’s Assets](https://i.ytimg.com/vi/kZ99jvX3Elo/default.jpg)
![The Hugh Thompson Show: Artificial Intelligence APJ Style](https://i.ytimg.com/vi/kU2EU5XIrzc/default.jpg)
![World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote](https://i.ytimg.com/vi/iFGve5MUUnE/default.jpg)
![Kevin Mitnick: Live Hack at CeBIT Global Conferences 2015](https://i.ytimg.com/vi/NtzZBTjKngw/default.jpg)
![How the Best Hackers Learn Their Craft](https://i.ytimg.com/vi/6vj96QetfTg/default.jpg)
![Keynote by Mr. Bruce Schneier - CyCon 2018](https://i.ytimg.com/vi/oQ1TJsEppOg/default.jpg)
![5 New Battery Technologies That Could CHANGE EVERYTHING](https://i.ytimg.com/vi/DOBBwx3Cbbk/default.jpg)
![Top 5 Cybersecurity Threats In 2018 #BQ](https://i.ytimg.com/vi/mY_LtZhd6xU/default.jpg)
![The Five Most Dangerous New Attack Techniques and How to Counter Them](https://i.ytimg.com/vi/9r2ZeATcNfw/default.jpg)
![Former NSA and Israeli Intelligence Directors on Resilience](https://i.ytimg.com/vi/h0GhyC7JZYM/default.jpg)
![You Should Learn How to Hack | Ymir Vigfusson | TEDxReykjavik](https://i.ytimg.com/vi/IaJtUCU004o/default.jpg)
![Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019](https://i.ytimg.com/vi/EF_0dr8WkX8/default.jpg)
![A Cloud Security Architecture Workshop](https://i.ytimg.com/vi/4TxvqZFMaoA/default.jpg)
![Security Operations 2018: What Is Working? What Is Not.](https://i.ytimg.com/vi/REHay69Q6SM/default.jpg)
![Top 10 Ways to Make Hackers Excited: About the Shortcuts Not Worth Taking](https://i.ytimg.com/vi/550MtVuprhg/default.jpg)
![Weaponizing the Deep Web | SANS OSINT Summit 2020](https://i.ytimg.com/vi/eLL6BPKvwlg/default.jpg)