Go Hack Yourself – Stories from 70,000 pentests

The presentation emphasizes the critical need for continuous security testing.

Topic

Awareness / Phishing / FraudCloud SecurityData protection / GDPRData security / DLP / Know-how protectionGovernance, Riskmanagement and ComplianceNetwork Security / Patch ManagementTrend topic

When & Where

calendar_month

Thu, 10/24/2024, 10:00 - 10:15

location_on

Forum, Booth 6-215

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

Session description

Assessing Security Effectiveness: Questions if organizations are fixing the right vulnerabilities, logging proper data, and configuring tools correctly. It emphasizes that time is a critical factor in addressing vulnerabilities, with mass exploitation often occurring within seven days.

Cognitive Biases in Cybersecurity: Highlights biases such as confirmation and anchoring bias, affecting how security teams approach potential threats.

Attack Techniques: Lists top techniques used by attackers, such as brute-forcing weak credentials, exploiting misconfigurations, and lateral movement across poorly segmented networks. It downplays the role of CVEs as the primary attack surface.

Adaptation of Attackers: Attackers use techniques beyond vulnerabi ...

Moderator