Technology and threats pace exceeds our ability to educate everyone about secure use of technology and defensive tactics. We will discuss current threats like ransomware, credentials abuse, data exposures, and many others. We will map defensive techniques that you need to know about these and emerging threats.
The Dark Web is a dark world inhabited by hackers covertly trading stolen data, information, and unlawful goods, therefore not a place many of us visit. This community of criminals continues to thrive, so let’s analyze this dark world and investigate the systems they use to steal our data and gain a better understanding of their targeting techniques, as well as learn about the Black-Market dynamics. The best way to stop or prevent a breach is by understanding this world of criminals and learn to beat them at their own game.
As our electronic footprint is growing, we attach our personal and corporate identity not only to computers, networks, and clouds but also to a countless number of devices in the Internet of Things. From medical devices, to home devices, to complex devices in manufacturing, and beyond we will discuss how your identity can be impacted by a security breach. What are the right steps that you should be taking for the IOT security?
The simplest way to compromise systems is not by hacking but through use of previously stolen information like credentials that would let the bad guys walk in through the front door and take everything. Therefore, stolen credentials have a high demand on the Dark Web and we are constantly barraged by news about massive credentials thefts. You should be protecting your users from losing their credentials and subsequent abuse. However, you should also protect them against misinformation about “new” credentials cache discoveries.
With 2018 almost behind us, let’s examine what advances did hackers make recently, and what is in store for us in 2019. Join this interactive webinar to learn more about trends in: Ransomware Phishing 0-day Exploitation DDoS, and others.
We try to fortify our perimeter against the hackers. The truth is that some of them get through, and in most dire cases, they take your data with them to the Dark Web. We will discuss detection of the breaches from the Dark Web perspective. What hackers do with your data, and how to tune your tools to detect your breached data outside of your perimeter.