Stäng meny

2 September 11:00 CEST

Cyber Attack Simulation

An inside look at how multi-stage attack campaigns operate today

Time & Location

2 September 11:00 CEST
GoToWebinar

About the Event

Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise. How does this happen, and what can we do to stop it? Get an inside look at the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before crown jewels are compromised.

At this session, you’ll get an interactive look at:

  • How a simple phishing email can lead to broader compromise.
  • Why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.
  • Our plans for Extended Detection and Response (XDR).

Join us for this special attack simulation and you’ll come away with new knowledge on today’s attack campaigns and insights on how defenders can gain the upper hand. The session will share the attacker’s mindset and how it impacts our strategies as defenders.

Don’t forget to stick around after the event for a live Q&A with our speakers. Deploy in the cloud or on-premise within hours to start preventing attacks and automating threat detection.

The event takes place every two weeks. Check out the registration page for the timing that suits you.

 

© Copyright 2022 | Kommando | All Rights Reserved


Drammensveien 127, 0277 Oslo

Linnégatan 2, 114 47 Stockholm

Åby Arenaväg 8A, 431 62 Mölndal

Close
To top