When Good Security Tech ‘Breaks Bad’

This video is Restricted to Professional Members only Please Login or Become a Pro Member
[um_loggedout]
[ultimatemember form_id=3587]
[/um_loggedout]

Presented By:

Dan Gortze

Synopsis:

You have spent significant financial and human resources to configure and protect your network and digital assets, purchased several new security tools and software, and now you’re wondering if those technologies will be able to protect your organization against potential cyber intrusions. Daniel Gortze, Delivery Manager for the SecureWorks Incident Response & Forensics Consulting Team, will examine real-life scenarios in which security technologies failed, and even worst cases where threat actors used an organizations’ own security technologies against them. Dan will not focus on the pros and cons of particular technologies, but rather examine the need for proper security architecture and the residual risk posed by the required pervasive visibility of many security technologies. He will also share experience and insights from the field. Key Topics Covered Include: • Examples of Threat Actor Abuse of Security Technology in real-world Incidents • Anti-Virus Abuse • Exploiting Whitelisting Misconfiguration • The Human Weak link • Lessons learned and actionable insights

 

0 Comments

Submit a Comment