Upcoming Webinars & Events

Getting Inside the Mind of an Attacker: Going Beyond the Exploitation of Software Vulnerabilities

July 7

10:00 a.m. CT

When evaluating potential risks to an organization, the human factor is one of most dynamic and crucial elements to consider. An attacker can take advantage of security pitfalls introduced by humans, gaining access and even escalating privileges. Anyone from a regular user to an IT admin can make simple but critical errors that allow a threat actor to enter your organization’s network.

In this live webinar, dive deep into the rationale behind such attacks and find out how a threat actor can take advantage of weaknesses found in software, configuration, and identity. Using three different attack scenarios that pen testers on the Core Security SCS team discovered and exploited in the field, cybersecurity expert Julio Sanchez will demonstrate how a real attack chain is opportunistically created based on initial findings. Learn about weaknesses such as firewall filtering rules or abusing Kerberos tickets, and how to ensure you have a strong security program that can manage such identity attacks.

We look forward to seeing you on July 7!


How Penetration Testing Reduces Risk

July 28

10:00 a.m. CT

Though cybersecurity defenses are increasingly sophisticated, threat actors have also become more creative in order to achieve their end goals. They continue to find new ways to use the technologies most integral to businesses – mobile devices, computers, servers, websites, wifi, and email – as entry points to breach networks for malicious purposes. What more can be done to reduce the risk of attack?

Watch cybersecurity expert Bob Erdman, senior product manager, review the different levels of penetration testing. Pros and cons of each level are discussed, including tools used, how to use the results, false positives, and more.

Learn how different techniques of ethical hackers are used and the steps needed to reduce risk through penetration testing, including:

  • Scoping strategies
  • Incorporating vulnerability scans
  • Post-test remediation measures