5 Most Effective Breach Methods - A Virtual Hacker Perspective

5 Most Effective Breach Methods - A Virtual Hacker Perspective

 

Available On Demand
Duration 1h 00min
Speakers
Itzik Kotler
Chief Technology Officer
SafeBreach
Itzik Kotler
Email: itzik.kotler@safebreach.com

Itzik Kotler is CTO and Co-Founder of SafeBreach. Itzik has more than a decade of experience researching and working in the computer security space. He is a recognized industry speaker, having spoken at DEFCON, Black Hat USA, Hack In The Box, RSA Europe, CCC and H2HC. Prior to founding SafeBreach, Itzik served as CTO at Security Art, an information security consulting firm, and before that he was SOC Team Leader at Radware (NASDQ: RDWR). Follow him on Twitter at @itzikkotler.
Ayal Yogev
Vice President of Product Management
SafeBreach
Ayal Yogev
Email: ayal.yogev@safebreach.com

Ayal is the VP of Product Management at SafeBreach. He has 20 years of experience in the enterprise security market in various disciplines-- product management, engineering, security research and ethical hacking. Prior to joining SafeBreach, Ayal led the Umbrella product management team at OpenDNS, which was acquired by Cisco on 2015 for $635M. Ayal also held senior product management positions at Lookout and Imperva and was part of Imperva's IPO in 2011. Ayal holds an MBA with honors from UC Berkeley Haas School of Business and a B.Sc. Summa Cum Laude in Electric Engineering and Computer Science from Tel-Aviv University.
Peter Krass
Contributing Editor
InformationWeek
Peter Krass
Peter Krass is a writer, editor, and editorial consultant with more than 20 years of experience as a professional journalist. His fields of expertise include information technology and small business, and he has worked in a wide variety of media, including magazines, newsletters (both print and e-mail), newspapers, books, film, and Web sites. Peter has worked extensively in Web-site publishing.

The SafeBreach platform continuously simulates hacker behavior, allowing organizations to see the impact from a breach – before it occurs. Which were the most effective techniques we used? How do they work? Which security controls were effective against these methods? How can you stop them? Join us for this webinar to explore our analysis from actual deployments and the Hacker’s Playbook to better secure your organization.

Attend this webinar and you will learn:

  • The top 5 most effective breach methods from a virtual hacker’s perspective
  • Mitigation techniques to address these breach methods
  • Tips for implementing the right security controls to address these methods
Already a member? Login