Meet the Hacker along with Deakin Cyber
From Rachel Mansson
views
comments
From Rachel Mansson
This is a full recreation of a true breach that CyberArk Labs performed a DF/IR for. This is a full supply chain attack that is broken down at each point there is a CyberArk mitigation/detection/tool. This presentation shows multiple CyberArk products and is the same presentation that can be found on the CyberArk on demand library.
Onwards Round Table with Len
Get to meet Len in person and learn about his research on QR Codes, Synthetic Identity and more.