This condensed, one-hour secure development webinar provides you with an instructor-led Secure Web Development Bootcamp training that will help your team better understand how to build secure websites. This session gets participants up-to-speed on the state of application security today by tying together current headlines to secure coding practices and principles. Demonstrations and re-enactments highlight how attackers take advantage of common web vulnerabilities.
Let's look at a practical model that has tangible meaning for practitioners, based on the Attack Lifecycle, and encompassing modern security capabilities to drive the outcome of not suffering any business impact resulting from a breach.
Today, 80% of corporate assets are likely virtual, dramatically increasing the risk of cybercrime. In this webinar you will learn how business continuity professionals can prepare for the possibility, mitigation and follow up in the case of a cyber breach.The webinar will focus on providing essential, accurate, and timely information to stakeholders before, during, and after a breach. You’ll learn to identify and prioritize your target audiences, and engage the proper channels of communications for effective internal and external communications. You’ll find out why it’s important that response evolves beyond traditional communication outlets, like press releases and conferences, to new communications venues like social media, Internet, intranet, email, text messaging, mass notification, and toll-free lines.
Black Hills Information Security
In this webcast we walk through the step-by-step defenses to stop the attackers in every step of the way we showed in Attack Tactics Part 5. Introduction, password spray toolkit, account lockout, honey accounts, canary tokens, and two factor authorization. fixthefuture , two factor authorization, dumping global address lists, mailsniper 20:30 Lateral movement, OWA, VPN, SSH. Scanning and enumeration, Nmap, SSH Brute Force, “Find Open”, LLMNR, LLMNR Responder, and NrlmRelayX.