TEISS 2015 - Case study: Understanding and mitigating targeted attacks Part 2/5 -TEISS: Cracking Cyber Security

IoT / TEISS 2015 – Case study: Understanding and mitigating targeted attacks Part 2/5

TEISS 2015 – Case study: Understanding and mitigating targeted attacks Part 2/5

  • Understanding what attackers do once inside thenetwork
  • Exploring and disrupting the privilege escalationcycle model
  • Using an anomaly detection concept

David Higgins, Professional Services Manager – UK&I, CyberArk, UK

 

Want to find our more? Click here for part 3

Shares

Comments