Go Hack Yourself – Stories from 70,000 pentests
The presentation emphasizes the critical need for continuous security testing.
Topic
Awareness / Phishing / FraudCloud SecurityData protection / GDPRData security / DLP / Know-how protectionGovernance, Riskmanagement and ComplianceNetwork Security / Patch ManagementTrend topic
When & Where
Details
Format:
Technology lecture
Session description
Assessing Security Effectiveness: Questions if organizations are fixing the right vulnerabilities, logging proper data, and configuring tools correctly. It emphasizes that time is a critical factor in addressing vulnerabilities, with mass exploitation often occurring within seven days.
Cognitive Biases in Cybersecurity: Highlights biases such as confirmation and anchoring bias, affecting how security teams approach potential threats.
Attack Techniques: Lists top techniques used by attackers, such as brute-forcing weak credentials, exploiting misconfigurations, and lateral movement across poorly segmented networks. It downplays the role of CVEs as the primary attack surface.
Adaptation of Attackers: Attackers use techniques beyond vulnerabi ...
Cognitive Biases in Cybersecurity: Highlights biases such as confirmation and anchoring bias, affecting how security teams approach potential threats.
Attack Techniques: Lists top techniques used by attackers, such as brute-forcing weak credentials, exploiting misconfigurations, and lateral movement across poorly segmented networks. It downplays the role of CVEs as the primary attack surface.
Adaptation of Attackers: Attackers use techniques beyond vulnerabi ...
Moderator
