In today’s threat landscape, many corporate users are being compromised by exploit kits and phishing campaigns. These offensive techniques are successful because they target outdated software and unsuspecting users. There are tools and configuration options to help prevent the execution of malicious binaries, the exploitation of web browsers, and the third party applications that are utilized by the browser. This presentation will cover methods for organizations to strengthen their environment from exploitation and compromise.
Kurtis Armour is a security professional who has been working in the industry for 4 years. He enjoys working on research projects and increasing his security knowledge. Pastime activities include mountain biking, golfing, squash, skydiving and more.