Webcast Replay – I Get Paid to Hack Your Company and These Are The Controls I Hate Most!
June 14, 2022
Drawing on over three decades of experience in penetration testing for global organizations of all sizes, this webcast outlines some of the most common attack methods in use today and shares effective approaches for tackling them.
It highlights the most effective security controls to prevent and mitigate common types of cyberattacks and emphasizes potential quick wins that can be achieved without the need for significant investment, and how to harness the technology already used by most organizations.
This webcast covers:
- Key tactics, techniques and procedures (TTPs) used by cyberattackers
- An ethical hacker’s view of some of the most commonly observed security challenges
- The attack kill chain and what it involves
- Key external and internal controls to help defend your organization
You can also download the presentation here.
People
How we can help
Cyber Risk
Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.
Kroll Responder
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Incident Response Tabletop Exercises
Kroll’s field-proven incident response tabletop exercise scenarios are customized to test all aspects of your response plan and mature your program.
Incident Response Plan Development
You learn today that your organization is facing some kind of cyber incident. Could be ransomware, highjacked O365 email account, PII or PHI exfiltrated, misconfigured network settings exposing data, etc. What do you do first?
Cyber Risk Assessments
Kroll's cyber risk assessments deliver actionable recommendations to improve security, using industry best practices & the best technology available.
Penetration Testing Services
Validate your cyber defenses against real-world threats. Kroll’s world-class penetration testing services bring together front-line threat intelligence, thousands of hours of cyber security assessments completed each year and a team of certified cyber experts — the foundation for our sophisticated and scalable approach.
FAST Attack Simulation
Safely perform attacks on your production environment to test your security technology and processes.
Data Breach Call Center Services
A notification event can generate a lot of questions from those affected by a data breach. Kroll’s call center services are provided by skilled representatives who know how to handle difficult questions and stand at the ready to serve your breached population.
Drawing on over three decades’ experience in penetration testing for global organizations of all sizes, this webcast outlines some of the most common attack methods in use today and shares effective approaches for tackling them.
The session will detail the most effective security controls to prevent and mitigate common types of cyberattacks. It will emphasize the potential quick wins that can be achieved without the need for significant investment or that harness the technology already used by most organizations.
The session will be presented by Carlos García, Senior Vice President, and Jeff Macko, Associate Managing Director.
The Webcast Will Outline
- Key tactics, techniques and procedures (TTPs) used by cyberattackers
- An ethical hacker’s view of some of the most commonly observed security challenges
- The attack kill chain and what it involves
- Key external and internal controls to help defend your organization
How we can help
Cyber Risk
Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.
Kroll Responder
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Incident Response Tabletop Exercises
Kroll’s field-proven incident response tabletop exercise scenarios are customized to test all aspects of your response plan and mature your program.
Incident Response Plan Development
You learn today that your organization is facing some kind of cyber incident. Could be ransomware, highjacked O365 email account, PII or PHI exfiltrated, misconfigured network settings exposing data, etc. What do you do first?
Cyber Risk Assessments
Kroll's cyber risk assessments deliver actionable recommendations to improve security, using industry best practices & the best technology available.
Penetration Testing Services
Validate your cyber defenses against real-world threats. Kroll’s world-class penetration testing services bring together front-line threat intelligence, thousands of hours of cyber security assessments completed each year and a team of certified cyber experts — the foundation for our sophisticated and scalable approach.
FAST Attack Simulation
Safely perform attacks on your production environment to test your security technology and processes.
Data Breach Call Center Services
A notification event can generate a lot of questions from those affected by a data breach. Kroll’s call center services are provided by skilled representatives who know how to handle difficult questions and stand at the ready to serve your breached population.