Common Cybersecurity Attacks: Tangible Steps for Prevention and Detection
August 14 @ 9:00 am - 3:00 pm
This workshop will cover the primary tactics cybercriminals use to break into organizations, steal data, and wreak havoc. Attackers look for the weakest link – is it your people, processes, or technology?
Common vulnerabilities and tactics within these areas will be discussed, including the following examples: social engineering, lack of incident response policies, and misconfigured firewalls.
The workshop will feature two case studies, combined with group activities designed to assess how an attacker got into the organization, the methods used to breach a system and brainstorming tactics to protect against and detect these types of attacks in the future. Case Studies will be real life scenarios adapted from businesses similar to those in attendance. Activities will result in tangible steps that you can implement in your own organization to prevent these types of attacks.
- Social Engineering Tactics (In-Person, Phishing, Removable Media, Telephone)
- Foundational Cyber Hygiene
- DFARS 800-171
- Common misconfigured and vulnerable technologies, such as:
- VPN Devices
- Unpatched systems
- Domain controllers
- Risk Assessment
- PII, PHI, and Sensitive Data Stealing
- Darknet and Black Market for stolen data
Cost: $309, includes workshop materials and lunch
Registration Deadline: August 7, 2018
Sponsor: IMEC, Alpine Security
Presenter: Alpine Security cybersecurity experts
Contact Name: Emily Lee, IMEC
Contact Phone: 309-677-4633
Contact Email: email@example.com