Dissecting the Attack: How Hackers Target and Compromise Products and Systems Just Like Yours

Tuesday, July 30th

Grand C

About the Session

Nearly every day, the headlines are full of breach announcements of major companies and organizations that leave us with many questions. How do these breaches happen? Why didn’t anyone notice? Why does this keep happening? Could this happen to me? This session will cover how attackers select, plan and attack their targets from start to finish with real-world scenarios and conclude with what you can do to protect your company’s reputation as a manufacturer or systems integrator.

In this session, attendees will learn how to:

  • Acquire a solid understanding of who hackers are and why they hack
  • Observe the steps of real-world attacks
  • Identify what steps were involved in the attacks

Presented By

Valerie Thomas
Executive Information Security Consultant