Cyberattacks - Motivations and Methods
Lunch Sponsor: Netanium
Description:We will discuss the kinds of threat actors (attackers) your organization is exposed to and their motivations for running cyberattacks, addressing different major attack categories and ways you can minimize their impact on your firm. You'll come away with some practical ideas on how to increase your defenses and move your cybersecurity program forward.
Presenter:Joshua Huston is the VP of Engineering & Marketing at Netanium. With an extensive background in technology design, implementation, operation and training, he has spent 20 years in the industry with more than a decade focused on information security and resilience. Josh and his engineering team help companies implement processes and technology to mature their resilience and information/cybersecurity programs, specializing in cybersecurity areas including architecture/design, operations and ongoing analysis of data (SOC services). An active member of the information security community, Josh is a lead organizer for MassHackers, BeanSec and BSides Boston.
Follow Us
© International Legal Technology Association. All Rights Reserved.
Accessibility | Terms & Conditions | Support Center