BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART:20231130T150000Z
DTEND:20231130T160000Z
X-MICROSOFT-CDO-ALLDAYEVENT:FALSE
SUMMARY:The Anatomy of a Cyberattack: Inside an Incident
DESCRIPTION:You've likely heard of cyberattacks but unless you've experienced one for yourself\, it is easy to think it'll never happen to you. However\, the threat of a cyberattack isn't something to be taken lightly and the damage that may occur from a poor incident response can be detrimental to an organization. During this webinar we will discuss the anatomy of an attack\, from initial reconnaissance all the way through post-incident analysis. We'll also cover best practices for defending against an attack\, strategies for responding quickly\, and common tactics used by attackers such as phishing\, malware injection\, and privilege escalation. Learning Objectives Discuss what constitutes a cyberattack and its various stages. Identify common techniques employed by attackers during an attack. Explore best practices for mitigating risk before an attack occurs. Analyze how to respond promptly if there is evidence of suspicious activity or intrusion. Describe methods for conducting post-incident analysis to identify weaknesses that need addressing.
X-ALT-DESC;FMTTYPE=text/html:You&rsquo\;ve likely heard of cyberattacks but unless you&#39\;ve experienced one for yourself\, it is easy to think it&rsquo\;ll never happen to you. However\, the threat of a cyberattack isn&rsquo\;t something to be taken lightly and the damage that may occur from a poor incident response can be detrimental to an organization. During this webinar we will discuss the anatomy of an attack\, from initial reconnaissance all the way through post-incident analysis. We&rsquo\;ll also cover best practices for defending against an attack\, strategies for responding quickly\, and common tactics used by attackers such as phishing\, malware injection\, and privilege escalation. Learning Objectives Discuss what constitutes a cyberattack and its various stages. Identify common techniques employed by attackers during an attack. Explore best practices for mitigating risk before an attack occurs. Analyze how to respond promptly if there is evidence of suspicious activity or intrusion. Describe methods for conducting post-incident analysis to identify weaknesses that need addressing.
LOCATION:online webinar
UID:e.3433.5116
SEQUENCE:3
DTSTAMP:20260421T194655Z
URL:https://business.growabilene.com/events/details/the-anatomy-of-a-cyberattack-inside-an-incident-11-30-2023-5116
END:VEVENT

END:VCALENDAR
