Cyber Weapons of 2015: Know Your Enemy (Because They Know You)
Island hopping techniques used by cybercriminals are becoming much more sophisticated. There has been a serious paradigm shift of cybercriminals to colonise our ecosystems. How are hackers targeting trusted third parties to bypass the perimeter defenses of the intended targets? Attendees will gain knowledge of the tactical shifts used by the cybercriminal underground that can be used to manage and defend the infestation of trusted user and customer accounts within their own organisations.