54% of organizations were compromised in 2017, primarily due to non-malware attack techniques. As a follow on to A pentesters perspective on malware and ransomware, join this webinar to hear SANS analyst, Dave Shackleford and Barkly CTO, Jack Danahy, discuss:
Why hackers have abandoned malware and moved to abusing built-in tools to initiate attacks
How attackers are leveraging native commands, powershell, WMIC, windows script host and more to defeat traditional endpoint solutions
Defensive and offensive strategies for detecting and mitigating attacks using these techniques
The importance of using frameworks like MITRE Attack and CSC to review your endpoint security readiness