“The perimeter is dead!” Security pros have said this for years because they’ve lost confidence in perimeter-based defenses. You can only automatically stop so many threats from getting into your environment, so you have to look for shady activity that might slip through that first line of defense.
The “death of the perimeter” is up for debate, but hackers keep exploiting vulnerabilities to gain access to your environment. Huntress sees attacks where the external perimeter is compromised all the time. In this session, you’ll see real-world attacks dissected by Huntress's elite SOC team, exposing how RDP, VPNs, and other entry points are compromised.
You’ll learn:
- How attackers can exploit RDP, VPNs, and more to gain access to your environment.
- About real-world examples from front-line security experts who detected and responded to these attacks.
- Simple configuration changes to reinforce your perimeter.
Cracks in the shell? Not after this session… ☠️