×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!

Red Team Insights on Pandemic Driven Security Vulnerabilities

June 10, 2020


In response to the pandemic, most organizations had to execute on business continuity plans. While some employees had experience in working remotely, many did not. Also, the focus of employees working remotely in today’s “new norm” is often diverted to family, health, adjusting to new technology and much more. Attackers, on the other hand, remain patiently focused on ways to gain a foothold into an organization. It’s all about credentials, lateral movement and escalation to achieve goals. 


Watch this webinar for insights on how attackers can:

• Compromise VPNs and jump stations with relative ease
• Steal privileged credentials and bypass Multi-factor Authentication (MFA) 
• Perform lateral movement in BYOD instances
 

Previous Video
Webcast: Privileged Access Management 101
Webcast: Privileged Access Management 101

You will learn: where privileged access exists and why it is under attack; the most common attack vectors; ...

Next Video
Best Practices that Protect Workstations
Best Practices that Protect Workstations

Best practices for protecting your organization from advanced attacks including tips for discovery, impleme...