Download this episode
If there is a weakness in your IT security system, wouldn't it be better to find it before someone else does? The worst thing is that even a small scale security breach could leave your business in poor condition and in the end information security is not an IT department's problem, it is a business issue! As long as we are aware of the value of the resources to be protected, why don't we put ourselves into the hacker's role and perform all the activities they would do as well? Of course it requires some very specific knowledge that may be hard to learn when our work focuses more on creating than destroying, but the results will give us a perspective on what other people with bad intentions can see. Sometimes it is really surprising how often you can use the same paths to enter the system! During this intensive session, become familiar with the mandatory tasks that are performed by hackers or penetration testers in order to check for misconfigurations and vulnerabilities. Come and join Paula in the journey to the darker side of IT security and use this knowledge for making good decisions in your system. Do not forget to keep the mandatory security check list in your pocket!
Available formats for this video:
Actual format may change based on video formats available and browser capability.
Event HomepageTechEd North America 2014
More episodes in this series
Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.