The number of security threats and vulnerabilities has exploded in recent years. Businesses must identify potential vulnerabilities and be proactive in assessing cyber threats and addressing any security gaps. Traditionally, these security vulnerabilities were detected using a computer program known as a vulnerability scanner, which scans networks, assets and applications for known weaknesses. But, in many cases, organizations may have complex vulnerabilities in their applications and business infrastructure that scanning tools alone can’t discover and more comprehensive assessment services are needed. Additionally, many organizations want to identify what TTPs (Tactics, Techniques, and Procedures) are used by sophisticated threat actors to compromise networks in various ways after the initial foothold has been obtained. Many times the traditional exploitation of a vulnerability via a missing security patch isn’t the only or primary means to gain the initial foothold, but leveraging misconfigurations or abusing protocols and other means can be used. This webinar will focus on how to position and sell three of Verizon’s Threat & Vulnerability assessment services: • Penetration Testing: Uses manual testing and advanced exploitation techniques to assess a customer's environment for various types of vulnerabilities and attempts various types of post-exploitation activities to measure the danger those weaknesses may cause, so they can prepare before an attack occurs. • Red Team Operations: Implements simulated sophisticated covert attacks to gauge the effectiveness of the customer’s defensive capabilities in terms of threat detection, response, and containment. It also serves as training exercises for defensive teams. • Ransomware Attack Simulation: Tests the current state of processes and technical aspects of company defenses and identifies measures they can take to prepare for a Ransomware attack.

Hora

20:00 - 21:00 hs GMT+1

Organizador

Verizon Business Group
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Abril / 2025 398 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 31 de Abril de 2025
Mar 01 de Abril de 2025
Mié 02 de Abril de 2025
Jue 03 de Abril de 2025
Vie 04 de Abril de 2025
Sáb 05 de Abril de 2025
Dom 06 de Abril de 2025
Lun 07 de Abril de 2025
Mar 08 de Abril de 2025
Mié 09 de Abril de 2025
Jue 10 de Abril de 2025
Vie 11 de Abril de 2025
Sáb 12 de Abril de 2025
Dom 13 de Abril de 2025
Lun 14 de Abril de 2025
Mar 15 de Abril de 2025
Mié 16 de Abril de 2025
Jue 17 de Abril de 2025
Vie 18 de Abril de 2025
Sáb 19 de Abril de 2025
Dom 20 de Abril de 2025
Lun 21 de Abril de 2025
Mar 22 de Abril de 2025
Mié 23 de Abril de 2025
Jue 24 de Abril de 2025
Vie 25 de Abril de 2025
Sáb 26 de Abril de 2025
Dom 27 de Abril de 2025
Lun 28 de Abril de 2025
Mar 29 de Abril de 2025
Mié 30 de Abril de 2025
Jue 01 de Abril de 2025
Vie 02 de Abril de 2025
Sáb 03 de Abril de 2025
Dom 04 de Abril de 2025

.

  • Comparativas de Software

    ¿No te salen las cuentas en la nube?

    La nube tiene importantes ventajas: ahorros de costes, facilidad para trabajar en equipos remotos, menor necesidad de administración de la infraestructura, mejoras de seguridad, etc. Sin embargo, al comentar con algunos clientes la posibilidad de migrar las licencias de Atlassian a cloud, me comentaron que habían hecho alguna experiencia de migración y no le salían tan bien las cuentas. Estos comentarios me hicieron reflexionar sobre cuáles podían ser las causas de que no salieran las cuentas y permitirme ofrecer algunas recomendaciones y consejos. ... Leer más

    Publicado el 22-Dic-2021 • 14.40hs

    0 comentarios

  • TODOS Comparativas de Software PDF

    Comparativas de software ERP para todos los sectores

    Publicado el 27-Set-2021 • 12.50hs

  • TODOS Comparativas de Software PDF

    Comparativas de software ERP para Fabricación

    Publicado el 27-Set-2021 • 09.51hs

.

.

.

.

.

Más Secciones »

Hola Invitado