Topic
The vast majority of cyber attacks do not use advanced malware. Rather, attackers use whatever they need to do the job. In this webcast, John Strand and Paul Asadoorian discuss the three most common tools used by attackers to gain access to a system. Attendees will understand that smart security professionals will use the same three tools to find and plug up vulnerabilities in their systems, thus preventing these attacks from occurring.
Slides
When
Tuesday, June 04, 2013 at 1:30 PM EDT (1730 UTC/GMT)
Presenters
John Strand and Paul Asadoorian
Register here To Listen To The Archive Recording