We’re delivering an afternoon of talks on a range of cybersecurity topics, to help organisations better understand the “Attacker’s Perspective” of an organisation’s security, so that they can better secure their networks.
Covering networks, cloud infrastructure, and web applications. This event will give the audience a good overview of the major security concerns that businesses face, as well as practical guidance on how they can secure their systems.
The series of short talks will be delivered by our technical lead, Holly Grace Williams. Holly has 17 years’ experience working in cybersecurity and holds a CREST fellowship. Holly spends her days working as a Penetration Tester, breaking into organisations to highlight their security flaws. In these talks she will share stories of successful hacks against major organisations and give guidance on how you can secure your systems against cybercriminals.
Whether your company has a simple brochureware website to advertise your services, or a complex SaaS platform, threat actors can target your site to deface it and damage your company brand. They may even be able to target users who visit your site to steal confidential information.
In this talk, we’ll demonstrate common website attacks, discuss why they can be so difficult to address, and finish with practical guidance on how to prevent these attacks.
With more companies moving more of their data and systems into the cloud, this area of security is a real concern for a lot of businesses. Whether you’re just using Microsoft Entra ID (Azure AD) to manage user accounts, or you’ve gone full-cloud, there’s risks to be addressed.
In this talk we’ll discuss how attackers can leverage cloud systems to get further into an organisation’s systems and its data. With practical guidance on prior attacks and how you can prevent them hitting your company in the future.
We’ll break in the middle for teas and coffees, but feel free to ask questions, talk to the team, or network. There’ll even be pastries for that mid-afternoon pick me up.
Whilst a lot of focus these days is around internet facing and cloud security, protecting your internal network and end user devices is still a critical step. With headlines talking about attackers pulling off complex phishing attacks and gaining easy access to end user devices, it’s important to make sure your devices are locked down.
We’ll demonstrate ways of compromising devices, propagating across networks, and causing major disruption – then we’ll talk about how to stop that happening.
© 2024 Akimbo Core Ltd
Play | Cover | Release Label |
Track Title Track Authors |
Page | Buy | Delete |
---|