Date: Wednesday, August 27, 2014
Time: 2:00 PM ET / 11:00 AM PT
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D’Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage.
- How attackers exploit vulnerabilities to take control of systems
- What they do next to find & exfiltrate valuable data
- How to catch them before the damage is done with AlienVault USM
Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tom D’Aquino, Security Engineer, AlienVault