The Five Most Dangerous New Attack Techniques, and What's Coming Next
Alan Paller, Moderator, Research Director and Founder, SANS Institute
Ed Skoudis, Faculty Fellow, Penetration Testing Curriculum Lead
SANS
Dr. Johannes Ullrich, Dean of Research, SANS Technology Institute, SANS Senior Instructor
James Lyne, Head of R&D, SANS Institute
Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare? This fast-paced briefing will provide answers from the three people best positioned to know the answers: the head of the Internet Storm Center, a top hacker exploits expert/teacher in the US and a top expert on cyberattacks in the United Kingdom.
https://www.rsaconference.com/events/us18/agenda/sessions/11413-The-Five-Most-Dangerous-New-Attack-Techniques,-and-What's-Coming-Next
Видео The Five Most Dangerous New Attack Techniques, and What's Coming Next канала RSA Conference
Ed Skoudis, Faculty Fellow, Penetration Testing Curriculum Lead
SANS
Dr. Johannes Ullrich, Dean of Research, SANS Technology Institute, SANS Senior Instructor
James Lyne, Head of R&D, SANS Institute
Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare? This fast-paced briefing will provide answers from the three people best positioned to know the answers: the head of the Internet Storm Center, a top hacker exploits expert/teacher in the US and a top expert on cyberattacks in the United Kingdom.
https://www.rsaconference.com/events/us18/agenda/sessions/11413-The-Five-Most-Dangerous-New-Attack-Techniques,-and-What's-Coming-Next
Видео The Five Most Dangerous New Attack Techniques, and What's Coming Next канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Don't learn to program in 2021!The Current State of Automotive SecurityThe Five Most Dangerous New Attack Techniques and How to Counter ThemJames Lyne: Everyday cybercrime -- and what you can do about itSecurity Operations 2018: What Is Working? What Is Not.Scaling Your Defenses: Next Level Security Automation for EnterpriseThe Hugh Thompson Show: Artificial Intelligence APJ StyleSANS Webcast: So, You Wanna Be a Pen Tester 3 Paths to ConsiderTop 10 Ways to Make Hackers Excited: About the Shortcuts Not Worth TakingWeaponization of the InternetThree Things the Security Industry Isn’t Talking About (but Should Be)Think and Act Like a Hacker to Protect Your Company’s AssetsThe Five Secrets of High-Performing CISOsFormer NSA and Israeli Intelligence Directors on ResilienceHow the NSA used radio waves to spy on offline computersTop Five Emerging Cybersecurity Challenges | Srini Sampalli | TEDxDalhousieUA Primer: Getting Started with MITRE ShieldCommon Sense From Uncommon InvestorsThe Dark Arts of Social Engineering – SANS Security Awareness Summit 2018The Fallacy of the "Zero-Trust Network"