![]() |
Offensive and Defensive Cyber Approaches: Why Law Enforcement Investigators Need to Understand Both Presented by: |
|
Offensive and Defensive Cyber Approaches: Why Law Enforcement Investigators Need to Understand Both Offensive and defensive cyber are often viewed as being distinct and different from one another. They are not. A successful offensive cyber program starts with a thorough understanding of the target’s defenses - with the focus towards identifying weaknesses in target systems. Conversely, a successful defensive cyber program starts with a thorough understanding of attack vectors, approaches and exploits – and eliminating those vulnerabilities. This webinar will look at today’s offensive and defensive cyber approaches, their strengths, weaknesses and effectiveness. Specific topics include: - Key cyber defense concepts (e.g., rules, signatures and updates) - How traditional defensive products and technologies work - How security protocols are layered and analyzed in real time - Survey of attack approaches, capabilities and how they can be chained together - Why the “latest and greatest” defensive measures were unable to detect attacks such as SolarWinds - How LEAs can structure their offensive cyber technologies - What is involved with an offensive cyber program, expected results, costs - Understanding legal constraints and risks Offensive or defensive is just a point of view. Presented by: All Contents Copyright © 2021
|