Identity Kill Chain: A Hacker’s Eye View of How Your Systems Get Pwned
In this nerve-wracking session, through live demos of current attack methods you’ll gain a deeper understanding of the criminals’ “tools of the trade,” where the weakest links in identity systems are & how best to break the kill-chain for each step.