Get up to speed on emerging threat actor tactics and techniques across the attack chain. In this session, we'll expound upon methods of Initial Access, Persistence, Defense Evasion, Lateral Movement, and Impact. You'll gain practical knowledge of specific configurations to detect and mitigate these threats, and learn common misconfigurations to avoid.
SEC301AdvancedBreakout sessionSecurity, Identity & Compliance