Stopping the Attacker You Know

One of the most challenging threats to mitigate is the “trusted employee”. They have a position on the inside of your network, they have ownership of a trusted computer and they have basic knowledge of the information assets available.

This presentation uses data from our penetration testing team to describe the specific techniques any employee could use to escalate their rights and take over your network. For each technique outlined, there will be a discussion of controls an organization can use to prevent, detect and contain each of these techniques manually or through tool-based automation.

Be sure to drop by Booth # 109 for your free gift. NOTE: For those attending our presentation/training session be sure to grab a ticket for a chance to win a GO Pro following the presentation.

Presented by

Links