As cybersecurity and cyberthreats become more prevalent in our personal and working lives, businesses have invested in solutions like antivirus software and endpoint protection to try and secure their employees, data and intellectual property. While these measures have been effective to some extent, we still hear about ransomware and malware attacks in the news almost every day. Do you know how secure your organization is and if you’re vulnerable to this type of attack?
Join Jack Chapman, VP of Threat Intelligence at Egress Software, as he explores how a hacker would scope out your organization as a potential target. See how a hacker thinks as we walk through each step of the kill chain.
In this session you’ll learn:
• How a hacker researches and decides upon target organizations and individuals
• The various weapons they can use to exfiltrate data and intellectual property from an organization
• The impacts of a successful breach on your organization
• What solutions exist to keep your organization secure and mitigate the risk of a phishing attack
Jack Chapman, VP of Threat Intelligence, Egress