Day Two: Thursday, August 22, 2019
Thursday, August 22nd, 2019
There has been a material shift toward attacks that exploit people, with threat actors tricking their targets into running their malware for them, handing over their credentials, or simply sending data or money to an impostor.
In this session, we’ll explore strategies for gaining visibility and mitigating risk in a people-centric threat landscape. You’ll learn how to build a security program & maturity model around protecting people, why nearly all threat actors have shifted away from technical exploits to compromise their targets, how organizations can leverage threat data to understand which people and departments are highly targeted, and how to design effective protection for highly attacked, highly vulnerable, and highly privileged users.