Session

First steps in defending against Cyber Thuggery

Criminals (thugs) attack systems in myriad ways. The techniques are understood but there are so many threats and ways that it's no wonder something slips through the net. Social engineering, phishing, spearphishing, homoglyphs, typosquatting, deep fakes, vulnerability exploits, dependency confusion and many more!

We will take you through the techniques that bad actors use, how you can identify them and the key actions and tools that you can use to make your system more secure.

Jamie Coleman

Loqate

Southampton, United Kingdom

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top