The number of security threats and vulnerabilities has exploded in recent years. Businesses must identify potential vulnerabilities and be proactive in assessing cyber threats and addressing any security gaps. Traditionally, these security vulnerabilities were detected using a computer program known as a vulnerability scanner, which scans networks, assets and applications for known weaknesses. But, in many cases, organizations may have complex vulnerabilities in their applications and business infrastructure that scanning tools alone can’t discover and more comprehensive assessment services are needed. Additionally, many organizations want to identify what TTPs (Tactics, Techniques, and Procedures) are used by sophisticated threat actors to compromise networks in various ways after the initial foothold has been obtained. Many times the traditional exploitation of a vulnerability via a missing security patch isn’t the only or primary means to gain the initial foothold, but leveraging misconfigurations or abusing protocols and other means can be used. This webinar will focus on how to position and sell three of Verizon’s Threat & Vulnerability assessment services: • Penetration Testing: Uses manual testing and advanced exploitation techniques to assess a customer's environment for various types of vulnerabilities and attempts various types of post-exploitation activities to measure the danger those weaknesses may cause, so they can prepare before an attack occurs. • Red Team Operations: Implements simulated sophisticated covert attacks to gauge the effectiveness of the customer’s defensive capabilities in terms of threat detection, response, and containment. It also serves as training exercises for defensive teams. • Ransomware Attack Simulation: Tests the current state of processes and technical aspects of company defenses and identifies measures they can take to prepare for a Ransomware attack.

Hora

20:00 - 21:00 hs GMT+1

Organizador

Verizon Business Group
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Marzo / 2026 289 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 23 de Marzo de 2026
Mar 24 de Marzo de 2026
Mié 25 de Marzo de 2026
Jue 26 de Marzo de 2026
Vie 27 de Marzo de 2026
Sáb 28 de Marzo de 2026
Dom 01 de Marzo de 2026
Lun 02 de Marzo de 2026
Mar 03 de Marzo de 2026
Mié 04 de Marzo de 2026
Jue 05 de Marzo de 2026
Vie 06 de Marzo de 2026
Sáb 07 de Marzo de 2026
Dom 08 de Marzo de 2026
Lun 09 de Marzo de 2026
Mar 10 de Marzo de 2026
Mié 11 de Marzo de 2026
Jue 12 de Marzo de 2026
Vie 13 de Marzo de 2026
Sáb 14 de Marzo de 2026
Dom 15 de Marzo de 2026
Lun 16 de Marzo de 2026
Mar 17 de Marzo de 2026
Mié 18 de Marzo de 2026
Jue 19 de Marzo de 2026
Vie 20 de Marzo de 2026
Sáb 21 de Marzo de 2026
Dom 22 de Marzo de 2026
Lun 23 de Marzo de 2026
Mar 24 de Marzo de 2026
Mié 25 de Marzo de 2026
Jue 26 de Marzo de 2026
Vie 27 de Marzo de 2026
Sáb 28 de Marzo de 2026
Dom 29 de Marzo de 2026
Lun 30 de Marzo de 2026
Mar 31 de Marzo de 2026
Mié 01 de Marzo de 2026
Jue 02 de Marzo de 2026
Vie 03 de Marzo de 2026
Sáb 04 de Marzo de 2026
Dom 05 de Marzo de 2026

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado