Thursday February 13th 2020

The Anatomy of a Hack: Perception vs. Reality

Learn the anatomy of a hack.

Prevent a data breach.


It’s a common belief that data breaches require a tremendous amount of sophistication to “break” through the almost impenetrable perimeter defenses that organizations have put in place.


Hackers don't break in. They log in!


Post-mortem analysis concludes that the source of a hack is most often compromised credentials, and the data proves it:


  • 74 percent of respondents acknowledge access to a privileged account was used in a breach, according to a study by Centrify.
  • 80 percent of security breaches involve compromised privileged credentials according to Forrester.


Register to learn the 3 major phases of the “cyber-attack lifecycle” (aka “kill chain”) and important measures for preventing data exfiltration, including:


  • Enforcing MFA
  • Using host-based auditing
  • Leveraging machine learning algorithms to monitor, identify, and alert on high risk activity



Dr. Torsten George

Cyber Security Evangelist



You’ll get the recording and slides even if you don’t show up, so register today for this complimentary webinar HERE.