How a Cyber Attacker Moves Through a Network
October 17th, 2023 | 1 PM Eastern
To understand the crime, you must first understand the criminal. Step beyond cybersecurity protection and into the mind of a hacker. Cybercriminals maneuver in the shadows, access through backdoors, and exploit vulnerabilities to gain network and systems access. Gain eye-opening insight into the approach, tools, and mindset of cybercriminals through redacted, but real-world, hacking examples of how an attacker moves through a network and how to defend against threat outbreaks.
By attending this webinar, participants will:
• Learn how hackers bypass fixes and security patches to exploit systems • Walkthrough real examples of various types of vulnerabilities
• Review key storage recommendations and remediation tactics
Designed for a non-technical audience, a Tyler Technologies expert offers an educational breakdown of redacted real-world cyber attacks with a focused goal of understanding more about hackers, how hacking happens, and knowing key vocabulary to feel confident discussing security and vulnerabilities before, and when, they happen.