This 2-day Cyber-Attack Detection for Mobile and Web Technology is specifically designed to help delegates gain strategic understanding of cyber-attack and how one can protect his/her organisation from being a victim of such attack. Delegates will have the opportunity to develop the necessary skills to identify the possible paths and attempts of a cyber-attack and most importantly how to recover from such attack in a timely manner.
o Cyber-attack ‘weapons’ (0-days, Advanced Persistent Threats)
o Recognise a cyber-crime attack
o Prepare your protection from cyber-crime attack
o How to deploy a red team security testing program)
o How to recover from an attack
Live Technical Demonstrations:
o Sniffing and hocking IoT
o Social engineering attack, including system take over (or ransomware)
o Network detection
o Memory and network forensics
For more information, please contact Katie at email@example.com or visit our event website.
Private industries need to join the fight against terrorist ideologies, says Financial Integrity Network Chairman Juan Zarate. Read how in the July edition of Security magazine. This issue also includes guidance about CSO compensation and salary, banking security, emergency notifications and more.