Online
June 14, 2022

Webcast Replay – I Get Paid to Hack Your Company and These Are The Controls I Hate Most!

Drawing on over three decades of experience in penetration testing for global organizations of all sizes, this webcast outlines some of the most common attack methods in use today and shares effective approaches for tackling them.

It highlights the most effective security controls to prevent and mitigate common types of cyberattacks and emphasizes potential quick wins that can be achieved without the need for significant investment, and how to harness the technology already used by most organizations.

This webcast covers:

  • Key tactics, techniques and procedures (TTPs) used by cyberattackers
  • An ethical hacker’s view of some of the most commonly observed security challenges
  • The attack kill chain and what it involves
  • Key external and internal controls to help defend your organization
 

You can also download the presentation here.

Hacking and Controls

Watch the Webcast Replay

Stay Ahead with Kroll

Cyber and Data Resilience

Kroll merges elite security and data risk expertise with frontline intelligence from thousands of incident response, regulatory compliance, financial crime and due diligence engagements to make our clients more cyber resilient.

Kroll Responder

Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.

Cyber Risk Assessments

Kroll's cyber risk assessments deliver actionable recommendations to improve security, using industry best practices & the best technology available.

Penetration Testing Services

Validate your cyber defenses against real-world threats. Kroll’s world-class penetration testing services bring together front-line threat intelligence, thousands of hours of cyber security assessments completed each year and a team of certified cyber experts — the foundation for our sophisticated and scalable approach.

FAST Attack Simulation

Safely perform attacks on your production environment to test your security technology and processes.

Data Breach Call Center Services

A notification letter can generate lots of questions for those affected by a data breach. Kroll’s call center services are provided by skilled representatives who know how to handle difficult questions and stand at the ready to serve your breached population.