Skip to content ↓ | Skip to navigation ↓

Imagine that you are operating on an old XP, Win98 or Windows Server 2003 system. The system is out-of-support and vulnerable to a raft of possible exploits.

However, it would be too disruptive to operations to update these systems since they’re running critical applications and processes. And even if you do upgrade to the latest versions, the list of new exploitable vulnerabilities will inevitably continue to grow.

The enemy of security and availability is unplanned change. This can come from an advanced nation-state adversary, a malicious insider, or even a well-meaning and trusted employee. To increase security and decrease downtime, it’s critical to prepare for this unplanned change. Attackers can change their tools, but their tactics and procedures will remain the same. Therefore, understanding existing tactics and procedures is key to being proactive to future attacks.

These aren’t long-term strategy ideologies, nor do they require significant expenditures to your existing IT budgets; these are actionable items that can be taken back and leveraged starting on Day One.

For more information, tune into our upcoming webcast Stop the Most Advanced Adversaries, where I will explore hardening techniques organizations can adopt today to significantly increase their security while improving the reliability and availability of systems.

Together, we’ll explore real attacks against real companies to analyze how attackers gained access and what the damage they caused. More importantly, we’ll identify the lessons we can learn from these attacks and how organizations far and wide can incorporate them into their security programs.


Date: Wednesday, March 29, 2017

When: 11 AM Pacific / 2 PM Eastern

Register Here!