For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Understanding the Enterprise Attack Surface

Understanding the Enterprise Attack Surface
On Demand
  • Recorded Date:Nov. 17, 2020
  • Event:On Demand
Understanding the Enterprise Attack Surface
Attackers have a number of ways to compromise your organization, ranging from web application attacks down to our users. The attack surface is vast, and the ability for an attacker to find one system and move laterally to others increases exponentially the further down the exploitation cycle an attacker gets. Active Directory plays a large role in many organizations and is often the method attackers use to piggyback single-sign-on and centralization in order to access a plethora of systems. This talk will dive into the various techniques attackers use in order to compromise an organization and how to best effectively prioritize and combat the threats we face today. Let's dive down into attack patterns, how they work, and how to best design your organization in a way that combats the threats we face today.

Watch Your Free Webcast

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.