Главная
Study mode:
on
1
RSAConference 2020 San Francisco February 24-28 Moscone Center
2
Goals
3
Changes in Vulnerability Management
4
Quick Question...
5
Egypt, Beau, Joff and my Fridge...
6
IoT Case Study: Hospital in Wyoming
7
An Exception..
8
Tshark Hunting
9
Wireshark
10
Zeek and User Agent Strings
11
Real Intelligence Threat Analytics
12
RITA and Long Connections
13
RITA and Beacons
14
Apply!
15
Process
Description:
Discover how to identify and address shadow IT and unauthorized remote access in this 50-minute RSA Conference talk. Learn about the risks associated with vendor access to networks, often implemented without explicit permission. Explore real-world examples, including the TeamViewer and Nuance attacks, to understand the scope of the problem. Gain insights into vulnerability management changes, IoT security challenges in healthcare settings, and effective network monitoring techniques. Master the use of tools like Tshark, Wireshark, Zeek, and Real Intelligence Threat Analytics (RITA) to detect long connections and potential beacons. Apply these practical strategies to enhance your organization's security posture and mitigate risks associated with shadow IT and remote access vulnerabilities.

Shadow IT and Shadow Remote Access - How to Find It

RSA Conference
Add to list
0:00 / 0:00