Go Hack Yourself – Erfahrungen aus 70.000 Pentests
Die Präsentation unterstreicht die kritische Notwendigkeit von kontinuierlichen Sicherheitstests.
Themen
Awareness / Phishing / FraudCloud SecurityDatenschutz / DSGVODatensicherheit / DLP / Know-how-SchutzGovernance, Riskmanagement und ComplianceNetzwerksicherheit / Patch-ManagementTrendthemen
Wann & Wo
Einzelheiten
Format:
Technik-Vortrag
Session Beschreibung
Assessing Security Effectiveness: Questions if organizations are fixing the right vulnerabilities, logging proper data, and configuring tools correctly. It emphasizes that time is a critical factor in addressing vulnerabilities, with mass exploitation often occurring within seven days.
Cognitive Biases in Cybersecurity: Highlights biases such as confirmation and anchoring bias, affecting how security teams approach potential threats.
Attack Techniques: Lists top techniques used by attackers, such as brute-forcing weak credentials, exploiting misconfigurations, and lateral movement across poorly segmented networks. It downplays the role of CVEs as the primary attack surface.
Adaptation of Attackers: Attackers use techniques beyond vulnerabi ...
Cognitive Biases in Cybersecurity: Highlights biases such as confirmation and anchoring bias, affecting how security teams approach potential threats.
Attack Techniques: Lists top techniques used by attackers, such as brute-forcing weak credentials, exploiting misconfigurations, and lateral movement across poorly segmented networks. It downplays the role of CVEs as the primary attack surface.
Adaptation of Attackers: Attackers use techniques beyond vulnerabi ...
Download
Moderator
