We (Could Have) Cracked Open the Network for Under $100

Logo
Presented by

Tony Anscombe, Chief Security Evangelist and Cameron Camp, Specialized Security Researcher, ESET

About this talk

Are you creating a potentially massive vulnerability when decommissioned hardware leaves the premises? Exploiting a vulnerability or spearphishing for credentials is hard work. But, someone can easily purchase them on the sprawling secondary hardware market. Presenters in this session tested the hypothesis that decommissioning processes may not wipe a device clean, leaving critical data from the previous owner accessible and open to abuse. Come hear what was accessed and the potential damage it could cause. Presented by Tony Anscombe, Chief Security Evangelist and Cameron Camp, Specialized Security Researcher, ESET

Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (34)
Subscribers (14995)
For over 30 years we‘ve helped watch over your progress, protecting it with our digital security solutions. Ours is the story of Progress. Protected. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front.