Topic

The vast majority of cyber attacks do not use advanced malware. Rather, attackers use whatever they need to do the job. In this webcast, John Strand and Paul Asadoorian discuss the three most common tools used by attackers to gain access to a system. Attendees will understand that smart security professionals will use the same three tools to find and plug up vulnerabilities in their systems, thus preventing these attacks from occurring.

Slides

When

Tuesday, June 04, 2013 at 1:30 PM EDT (1730 UTC/GMT)

Presenters

John Strand and Paul Asadoorian
Register here To Listen To The Archive Recording

About the author

Paul Asadoorian is the Founder & CEO of Security Weekly, where the flagship show recently re-titled "Paul's Security Weekly" has been airing for over 8 years. By day he is the Product Evangelist for Tenable Network Security. Paul produces and hosts the various shows here at Security Weekly, all dedicated to providing the latest security news, interviews with the industries finest and technical how-to segments. Paul is also the founder and host of "The Stogie Geeks Show", featuring cigar reviews for cigar enthusiasts.