Speaker: Daniel Gortze - Delivery Manager for the SecureWorks Incident Response & Forensics Consulting Team
Recorded: October 18, 2016
Duration: 60 Mins
Key topics covered include:
- Examples of threat actor abuse of security technology in real-world incidents
- Anti-virus abuse
- Exploiting whitelisting misconfiguration
- The human weak link
- Lessons learned and actionable insights
You have spent significant financial and human resources to configure and protect your network and digital assets, purchased several new security tools and software, and now you're wondering if those technologies will be able to protect your organization against potential cyber intrusions.
Join this webcast and hear from Daniel Gortze, Delivery Manager for the SecureWorks Incident Response & Forensics Consulting Team, who will examine real-life scenarios in which security technologies failed, and even worst cases where threat actors used an organizations' own security technologies against them. Dan will not focus on the pros and cons of particular technologies, but rather examine the need for proper security architecture and the residual risk posed by the required pervasive visibility of many security technologies. He will also share experience and insights from the field.