Learn the basics of technical exploitation and how hackers target and ultimately exploit vulnerable people and places.
Full Description
Technical exploitation comes down to four basics: patching, permissions, people, and physical. In a world rife with hackers and exploiters, malware and malice, understanding the influx of bad actors is important in establishing a secure operating environment. Learn the basics of technical exploitation and how hackers target and ultimately exploit vulnerable people and places. A technical background is helpful for grasping the details.
This webinar is sponsored by the ASIS Information Technology Security Community. Registration is free for ITSC Members.
Learning Objectives
Upon completion, participants will be able to:
- Attendees will learn to identity when being solicited for nefarious purposes.
- Attendees will learn how systems are compromised through common techniques.
- Attendees will be learn defensive techniques for identifying and countering social engineering.
Credit Information
Completion of this webinar is eligible for 1 CPE credit. CPE credits will be updated in your user profile within 48 hours of completion. Self-reporting of CPE credits is not required.
Expand Your Learning!
ASIS joins the U.S. Department of Homeland Security and the E.U. Agency for Network and Information Security (ENISA) in recognizing October as Cybersecurity Awareness Month. In that vein, theInformation Technology Security Community hosts several webinars addressing various cybersecurity topics to help you, your organization, and your communities stay safe online. For more cybersecurity resources, visit https://www.asisonline.org/cybersecurity.
Presenter*
Matt James
Apple, Inc.
Matt James is a seasoned security professional, having served in associated roles for more than 15 years. A combat-wounded veteran, Mr. James started his career in cybersecurity following his medical retirement from the U.S. Army. His experience spans the US Department of State to the US Army Special Operations Command, to civilian roles for ManTech, Frontier Communications, ID.me, and now Apple. He resides in the Austin, Texas area with his wife, where he continues supporting veteran and infosec initiatives.
*Note: Speakers and content are subject to change without notice.