> AlienVault > How to Detect System Compromise and Data Exfiltration

How to Detect System Compromise and Data Exfiltration

Published By: AlienVault
AlienVault
Published:  Oct 21, 2014

Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage.
You'll learn:

  • How attackers exploit vulnerabilities to take control of systems
  • What they do next to find & exfiltrate valuable data
  • How to catch them before the damage is done with AlienVault USM

Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.



Tagsvulnerability, management, risk, prioritize, profile, environment, data, asset value