Explore the worlds best online cybersecurity training with OnDemand - view a Demo Today!


To attend this webcast, login to your SANS Account or create your Account.

Securing Against the Most Common Vectors of Cyber Attacks- A SANS Master's Degree Presentation

  • Wednesday, June 13th, 2018 at 10:30 AM EDT (14:30:00 UTC)
  • Richard Hummel
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.

You can now attend the webcast using your mobile device!


Advanced Persistent Threat (APT) adversaries run highly targeted, multifaceted campaigns to exploit vulnerabilities either through holes in an organization's security implementation or by targeting the human element which often uses social engineering. Financially motivated actors indiscriminately send mass spam emails in credential harvesting campaigns or deploy ransomware. These attack vectors are the most common against organizations of any size, but often have a greater impact on small to medium-sized business that may not have a robust security posture. As a security practitioner, it is imperative to posture an organization to prevent and mitigate the risk posed by these attacks. The Critical Security Controls (CSC) are the industry standard for securing an environment but may be costly and time-consuming to implement; also, some of them may not be as applicable to all organizations. This presentation examines the controls from a risk perspective given the common attack vectors, and explains how an organization may secure themselves against the threats.

Speaker Bio

Richard Hummel

Richard Hummel is a cyber security professional. He started his career in the military as a signals intelligence analyst with the Army. He became a certified cyber analyst and deployed overseas to support Army intelligence operations. Upon leaving the military, he contracted for the Army working with INSCOM in support of computer network operations and SIGINT cyber discovery. During his tenure as a contractor he learned how to reverse engineer malware and eventually joined iSIGHT Partners/FireEye to lead the technical intelligence team focused on financially motivated adversaries. He spent four years in this position before joining Arbor Networks ASERT team as the Threat Intelligence Manager.

Richard is a candidate for the Master of Science degree in Information Security Engineering from the SANS Technology Institute. 

The SANS Technology Institute is the only graduate program that combines SANS technical training, recognized as the industry’s best, with leadership and management curriculum specifically developed for the unique needs of aspiring leaders. Learn more at www.sans.edu.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.