Traditional ideas of “exposed systems” are not up to the challenge of finding the paths determined attackers can use to attack and compromise systems. A variety of data must be collected, analyzed, and correlated to find threats both obvious and subtle. This presentation will explore the information needed, and the analysis required to find exposures which can lead to compromise. This session will help you understand the concept of attach paths, know what techniques can be used to find attack paths and prioritize them for mitigation, and learn what types of tools you may already have available, to help identify and address attack paths (non-vendor specific, tool types, not specific products). This session will be held in the Technical Theatre.
Visit Tenable at Stand J80