John, more and more enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren't overlooking key vulnerabilities?
Attend and you'll: - Take a fresh look at your innocent enterprise tools, and see how an attacker "living off the land" might abuse them
- Learn to differentiate between your company's crown jewels and the assets that an attacker thinks are most valuable
- Discover how to use this adversarial point of view to bolster your defensive strategy
|