Join a former ethical hacker for this review of both common and surprising methods hackers use to explore environments once breached. You gain insight into their tactics and methods of control to minimize lateral movement, halting exfiltration of your valuable data.
talk-data.com
Company
ThreatLocker, Inc
Speakers
1
Activities
1
Speakers from ThreatLocker, Inc
Talks & appearances
1 activities from ThreatLocker, Inc speakers