On-demand Replay

The Attacker’s Playbook: Security Tactics from the Front Lines

Our experts share real-world examples and insights based on the attack techniques they’ve encountered this year and teach you how to identify and proactively defend against them.

The conversation will cover:

  • The cyber kill chain, from initial breach through data exfiltration
  • Common and emerging attack techniques to be aware of
  • Real-world examples of breaches combatted by Varonis’ MDDR team

Speakers:

MikeThompson

Mike Thompson

Director, Cloud and Security Architecture

Joseph Avanzato

Joseph Avanzato

Security Operations and Forensics Group Leader, R&D - MDDR

Dor Yardeni

Dor Yardeni

Director of Security Research, R&D - Engineering

Ready to see the #1 Data Security Platform in action?

Ready to see the #1 Data Security Platform in action?

Varonis shows you where sensitive data is concentrated and automatically remediates overexposure—getting you to least privilege without human intervention.
  • Magna ipsum lorem dolor justo Magna ipsum lorem dolor justo
  • Magna ipsum lorem dolor justo Magna ipsum lorem dolor justo
M365 - Sensitive data permissions - w770px