VISIT our webpage dedicated to Log4j and WATCH an expert-led webinar for even more details.

VIRTUAL EVENT

ATTACK & DEFEND

THE ENDPOINT THREAT

VIRTUAL EVENT

ATTACK & DEFEND

THE ENDPOINT THREAT

THE ULTIMATE ENDPOINT HACKING & DEFENSE SIMULATION

Most attacks start on the endpoint. Time to embrace the threat and brush up on your defense skills. Experience the Attack & Defend Virtual War Room and watch and learn as White Hat hackers Len Noe and Andy Thompson battle head-to-head in a real-world endpoint hacking and defense simulation.

NO BACKDOOR WILL BE LEFT UNOPENED

Crypto Jacking

Cryptocurrency mining at its best. No need to sweat, you may never find out. Until you see the bill from your cloud vendor.

Dynamic Ransomware

Untraceable financial transactions. Code that propagates throughout a network. Confidential data that gets leaked.

Multiple Attack Scenarios

Common and less common attacks will be played out in the virtual war room. Pay close attention to catch the hacker out.

THINK LIKE AN ATTACKER

On-Demand Webinar