While it’s easy to imagine a black-hat hacker as a hoodie-clad loner coding away in a dark room, this is seldom the case. Many operate in groups or even as part of larger communities or networks, and they often use the same techniques, strategies, and tools to accomplish their ends. Hackers are coordinated and work within a broad and complex network. They often have salaries, set holidays, bonus payments and sales arrangements that include reseller portals and component rental. The only prerequisite for becoming a target is simply having a website, which puts all businesses with an online presence at risk. Fortunately, threat awareness and a proactive approach to security can go a long way in keeping your business secure. Join Kelvin Murray, Webroot Senior Threat Researcher, to learn why hackers hack and the methods they use so you can predict incoming threats, combat attacks, and securely lock down your business. Key takeaways: · Understand the major motivations behind why hackers hack · Learn the strategies, tricks, and tools that hackers use to breach a business and which matter most for different business types · Find out how to keep your business safe from becoming a target Register Now!

Hora

18:00 - 19:00 hs GMT+1

Organizador

Information Technology Security
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Junio / 2020 801 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 01 de Junio de 2020
Mar 02 de Junio de 2020
Mié 03 de Junio de 2020
Jue 04 de Junio de 2020
Vie 05 de Junio de 2020
Sáb 06 de Junio de 2020
Dom 07 de Junio de 2020
Lun 08 de Junio de 2020
Mar 09 de Junio de 2020
Mié 10 de Junio de 2020
Jue 11 de Junio de 2020
Vie 12 de Junio de 2020
Sáb 13 de Junio de 2020
Dom 14 de Junio de 2020
Lun 15 de Junio de 2020
  • 5 Steps to Security Validation

    20:00 - 21:00 hs GMT+1

    Fecha
    Lun 15-Jun-2020, 20:00 - 21:00 hs GMT+1
    Descripción
    Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we (...)
    Cerrar
Mar 16 de Junio de 2020
Mié 17 de Junio de 2020