Valerie Thomas

Valerie Thomas

Executive Information Security Consultant



Dissecting the Attack: How Hackers Target and Compromise Products and Systems Just Like Yours

Nearly every day, the headlines are full of breach announcements of major companies and organizations that leave us with many questions. How do these breaches happen? Why didn’t anyone notice? Why does this keep happening? Could this happen to me? This session will cover how attackers select, plan and attack their targets from start to finish with real-world scenarios and conclude with what you can do to protect your company’s reputation as a manufacturer or systems integrator