Joseph has worked with some of the world's largest financial services organizations, helping innovate, architect, and develop grid computing farms. He played a critical role in one of the world's largest digital transformations to the cloud that consisted of more than 360 thousand users and is also a certified foreign exchange and money markets trader. Come and learn from Joseph's lessons and experience on adopting Zero Trust and reducing the risks from cyberattacks.
In 2021 endpoints will continue to be a top target for cybercriminals. Take a journey through the mind of an Ethical Hacker, how to exploit endpoints, what you can do to reduce the risks and improve endpoint protection.
This session is intended to provide a few of the attack paths that adversaries use to gain control and abuse endpoints so they can laterally move onto other sensitive systems within your network. It could lead to elevating privileges to steal the keys to the kingdom and gain full domain admin access, deploy nasty harmful Ransomware to bring your business to its knees until you pay a ransom or steal sensitive company data and threaten to release it publicly or abuse it.
Let’s get visibility into the how so you can put the strict security controls and harden your companies endpoints. Here are just a few of the risks that organizations face from cyberattacks. It is always important to take a risk-based approach and consider which of these risks pose the biggest threat to your business, employees, and customers: