TWC: Hacker’s Perspective on Your Windows Infrastructure: Mandatory Check List

Sign in to queue

Description

If there is a weakness in your IT security system, wouldn't it be better to find it before someone else does? The worst thing is that even a small scale security breach could leave your business in poor condition and in the end information security is not an IT department's problem, it is a business issue! As long as we are aware of the value of the resources to be protected, why don't we put ourselves into the hacker's role and perform all the activities they would do as well? Of course it requires some very specific knowledge that may be hard to learn when our work focuses more on creating than destroying, but the results will give us a perspective on what other people with bad intentions can see. Sometimes it is really surprising how often you can use the same paths to enter the system! During this intensive session, become familiar with the mandatory tasks that are performed by hackers or penetration testers in order to check for misconfigurations and vulnerabilities. Come and join Paula in the journey to the darker side of IT security and use this knowledge for making good decisions in your system. Do not forget to keep the mandatory security check list in your pocket!

Day:

4

Session Type:

Breakout

Code:

DCIM-B366

Room:

Grand Ballrm A

Embed

Download

Download this episode

The Discussion

  • User profile image
    manncl

    Some really great information was shared in this session, if you ever wanted to peek behind the curtain and see what hackers do when we oops I mean they find weakness in IT infrastructure.

  • User profile image
    Alex Shoykhet

    Great session. Shows what can be done if you are not security your resources properly

Add Your 2 Cents