Every security incident has to start somewhere. Sometimes the attacker gets into an organization via phishing. Other times they use SQL injection. Or, they may use an off-the-shelf exploit kit, mass malware, drive-by attack, ‘l33t zero-day exploits, access via other compromises, or some other technique like 2014’s vulnerability à la mode: HeartBleed.
Join Mandiant’s Evan Peña and Chuck Willis as they discuss the recent trends and novel techniques in how attackers gain their initial foothold in victim networks.
This webinar will cover:
- Specific case studies that illustrate the types of vulnerabilities and systems targeted by attackers
- Methods to prevent intrusions using the different vectors, along with potential mechanisms to detect the attacks
- Tools used by the attackers and how to replicate the incidents
As always, we will leave plenty of time for Q & A.