Webcast Replay – I Get Paid to Hack Your Company and These Are The Controls I Hate Most!

June 14, 2022 | (Online)
Hacking and Controls
Watch the Webcast Replay

Drawing on over three decades of experience in penetration testing for global organizations of all sizes, this webcast outlines some of the most common attack methods in use today and shares effective approaches for tackling them.

It highlights the most effective security controls to prevent and mitigate common types of cyberattacks and emphasizes potential quick wins that can be achieved without the need for significant investment, and how to harness the technology already used by most organizations.

This webcast covers:

  • Key tactics, techniques and procedures (TTPs) used by cyberattackers
  • An ethical hacker’s view of some of the most commonly observed security challenges
  • The attack kill chain and what it involves
  • Key external and internal controls to help defend your organization
 

You can also download the presentation here.


Cyber and Data Resilience

Incident response, digital forensics, breach notification, security strategy, managed security services, discovery solutions, security transformation.

Kroll Responder

Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.

Incident Response Tabletop Exercises

Kroll’s field-proven incident response tabletop exercise scenarios are customized to test all aspects of your response plan and mature your program.


Incident Response Plan Development

You learn today that your organization is facing some kind of cyber incident. Could be ransomware, highjacked O365 email account, PII or PHI exfiltrated, misconfigured network settings exposing data, etc. What do you do first?

Cyber Risk Assessments

Kroll's cyber risk assessments deliver actionable recommendations to improve security, using industry best practices & the best technology available.

Penetration Testing Services

Validate your cyber defenses against real-world threats. Kroll’s world-class penetration testing services bring together front-line threat intelligence, thousands of hours of cyber security assessments completed each year and a team of certified cyber experts — the foundation for our sophisticated and scalable approach.


FAST Attack Simulation

Safely perform attacks on your production environment to test your security technology and processes.

Data Breach Call Center Services

A notification letter can generate lots of questions for those affected by a data breach. Kroll’s call center services are provided by skilled representatives who know how to handle difficult questions and stand at the ready to serve your breached population.