Network Compromise for the Technically Challenged (Dummies)

  • Webcast Aired Thursday, 11 Jun 2020 3:30PM EDT (11 Jun 2020 19:30 UTC)
  • Speaker: Doc Blackburn

You can't defend against what you don't understand! To protect organizational assets from compromise you need to know how the attacker is going to act. This talk is intended to be a mostly non-technical talk that won't show you how to do it but shows you how it's done.

The seven steps covered are:

1. Reconnaissance

2. Scanning

3. Initial Point of Compromise

4. Lateral Movement

5. Data Exploitation

6. Creating Back Doors

7. Cleaning Up