TWC: Hacker’s Perspective on Your Windows Infrastructure: Mandatory Check List

Download this episode

Download Video


If there is a weakness in your IT security system, wouldn't it be better to find it before someone else does? The worst thing is that even a small scale security breach could leave your business in poor condition and in the end information security is not an IT department's problem, it is a business issue! As long as we are aware of the value of the resources to be protected, why don't we put ourselves into the hacker's role and perform all the activities they would do as well? Of course it requires some very specific knowledge that may be hard to learn when our work focuses more on creating than destroying, but the results will give us a perspective on what other people with bad intentions can see. Sometimes it is really surprising how often you can use the same paths to enter the system! During this intensive session, become familiar with the mandatory tasks that are performed by hackers or penetration testers in order to check for misconfigurations and vulnerabilities. Come and join Paula in the journey to the darker side of IT security and use this knowledge for making good decisions in your system. Do not forget to keep the mandatory security check list in your pocket!



Session Type:





Grand Ballrm A



Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    • User profile image

      Some really great information was shared in this session, if you ever wanted to peek behind the curtain and see what hackers do when we oops I mean they find weakness in IT infrastructure.

    • User profile image
      Alex Shoykhet

      Great session. Shows what can be done if you are not security your resources properly

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.