Hackers are notorious in Hollywood for the statement “I’m In!” from notorious shows like Mr. Robot and Criminal Minds to movies like Snowden and The Girl with the Dragon Tattoo. You usually hear the good or bad hacker exclaim this when they’ve “owned the system, followed by explosions or some grand finale sign of rebellion.
However, the real world is much different. Cyber criminals are constantly looking for new ways to make money. Usually they do this by using businesses as a means to an end; stealing and selling their data. The initial breach of information systems is the first step in a sophisticated and persistent process, but unlike Hollywood, there is no one shouting “I’m in!”
These days, hackers won’t let you know that they’ve taken over your systems. They won’t make annoying things flash on your screen. They will stay inside your network, owning machine after machine, collecting data on your employees, your contracts, your clients, your designs, and your banking information. It is much more profitable to stay quiet and undetected than to give you any reason to suspect that they are there.
From malicious crypto miners stealing a company’s computing resources to data breaches and data leaks. Michael Frauenhoffer’s talk will discuss many avenues hackers take after “they’re in.”
RSVP to hear Michael Frauenhoffer give this talk and a hacking demo at our cyber security symposium on October 3rd, 2019.