5 Most Effective Breach Methods - A Virtual Hacker Perspective
Itzik Kotler is CTO and Co-Founder of SafeBreach. Itzik has more than a decade of experience researching and working in the computer security space. He is a recognized industry speaker, having spoken at DEFCON, Black Hat USA, Hack In The Box, RSA Europe, CCC and H2HC. Prior to founding SafeBreach, Itzik served as CTO at Security Art, an information security consulting firm, and before that he was SOC Team Leader at Radware (NASDQ: RDWR). Follow him on Twitter at @itzikkotler.
Ayal is the VP of Product Management at SafeBreach. He has 20 years of experience in the enterprise security market in various disciplines-- product management, engineering, security research and ethical hacking. Prior to joining SafeBreach, Ayal led the Umbrella product management team at OpenDNS, which was acquired by Cisco on 2015 for $635M. Ayal also held senior product management positions at Lookout and Imperva and was part of Imperva's IPO in 2011. Ayal holds an MBA with honors from UC Berkeley Haas School of Business and a B.Sc. Summa Cum Laude in Electric Engineering and Computer Science from Tel-Aviv University.
The SafeBreach platform continuously simulates hacker behavior, allowing organizations to see the impact from a breach – before it occurs. Which were the most effective techniques we used? How do they work? Which security controls were effective against these methods? How can you stop them? Join us for this webinar to explore our analysis from actual deployments and the Hacker’s Playbook to better secure your organization.
Attend this webinar and you will learn:
- The top 5 most effective breach methods from a virtual hacker’s perspective
- Mitigation techniques to address these breach methods
- Tips for implementing the right security controls to address these methods