Stream the podcast now!
As the workplace has moved online and an increasing number of employees begin to work from home, the challenges to our data security have increased exponentially. Digitalization, cloud based-services, and the rise of online marketplaces and services have increased the number of entry points for malicious actors who want to exploit sensitive data.
This webinar explores leaked credentials and account takeovers:
- The acquisition of credentials by malicious actors using phishing attacks and database leaks
- The testing of leaked credentials by malicious actors on multiples websites to determine their value
- The monetization of leaked credentials
- The weak points in this attack chain and the solutions that prevent account takeovers
The webinar is made for security professionals that need to protect sensitive data in customer and client web portals
As a CISO, director, manager or even analyst of cybersecurity, reacting to each new threat can be made easier if you understand where the attacks are coming from as well as the complete attack chain.
Integrate the world’s easiest to use and most comprehensive cybercrime database into your security program in 30 minutes.
Blue teams need to be effective all the time whereas malicious actors only need to be succesful once to gain access to sensitive data. This webinar will present the best in class defenses and decrease your time to know if an unfortunate incident were to happen.
Other streaming options:
Get the information from a Cyber Threats & Protection Specialist
David Hétu – Chief Research Officer at Flare Systems
As Chief Research Officer, David leads the scientific research operations at Flare Systems. A PhD in criminology from the Université de Montréal, he focuses his research on illicit markets on the internet and the darknet. His findings, published in over 40 articles over the last 10 years, have provided insights into the structure and inner workings of the criminal underground.