Explore a 48-minute conference talk from RSA Conference that challenges you to adopt a hacker's mindset to bolster your company's cybersecurity. Delve into the reality of persistent cyber threats and learn why proper infrastructure protection is crucial. Discover how to identify potential weaknesses in your IT security system before malicious actors exploit them. Gain insights into daily practices that can shield your business from attacks and understand why information security is a company-wide concern, not just an IT department issue. Through practical examples and scenarios, learn to think and act like a hacker, exploring common attack vectors such as social engineering, weak passwords, and USB stick vulnerabilities. Examine the importance of network monitoring and understand the critical role of cybersecurity professionals in safeguarding corporate assets.
Overview
Syllabus
Introduction
Story Time
The Story
Social Engineering
Passwords
Example
Thinking and acting like a hacker
USB Sticks
Fish biting
Reckless abandon
My job
Monitoring
Network Monitoring
Taught by
RSA Conference