Program Manager II, Enterprise Experience & Management
Today's cyberattacks have become increasingly advanced and sophisticated. Hackers no longer need to identify the next zero-day vulnerability in the network stack or database server to get in. All they do is send an e-mail and ask for permission by hiding a malicious macro in the so called "Sales report." This session will demonstrate some of the tools hackers use to prepare and launch a social engineering attack and showcase how technologies like Windows Defender ATP can help detect and respond to these emerging threats.
You will learn:
- How hackers prepare a social engineering attack
- Techniques to protect against common social engineering attacks
- How to detect and respond cyber-threats