Lab Home | Phone | Search | ||||||||
|
||||||||
Although the tools of digital attackers have evolved over the years, the methodology and approach has remained fundamentally the same. This talk will begin with an overview of a typical attacker's workflow, and discuss how they break the underlying security mechanisms in the system(s) under attack. Risks involving 3rd party SaaS, web applications, and native code will be discussed, along with techniques on how to practically evaluate and mitigate them at scale. Host: Carleton Coffrin |