Exploring Leaked Credentials:
Practical Guide To Account Takeovers Prevention


Data Security - Threat Intelligence - External Threat Protection



Watch the video!

Play Video

As the workplace has moved online and an increasing number of employees begin to work from home, the challenges to our data security have increased exponentially. Digitalization, cloud based-services, and the rise of online marketplaces and services have  increased the number of entry points for malicious actors who want to exploit sensitive data.

This webinar explores leaked credentials and account takeovers:

  • The acquisition of credentials by malicious actors using phishing attacks and database leaks
  • The testing of leaked credentials by malicious actors on multiples websites to determine their value
  • The monetization of leaked credentials
  • The weak points in this attack chain and the solutions that prevent account takeovers

The webinar is made for security professionals that need to protect sensitive data in customer and client web portals

As a CISO, director, manager or even analyst of cybersecurity, reacting to each new threat can be made easier if you understand where the attacks are coming from as well as the complete attack chain.

 

Blue teams need to be effective all the time whereas malicious actors only need to be succesful once to gain access to sensitive data. This webinar will present the best in class defenses and decrease your time to know if an unfortunate incident were to happen.

Sign up for our newsletter to receive our next webinar date and information!

Get the information from a Cyber Threats & Protection Specialist

David Hétu Chief Research Officer at Flare Systems

As Chief Research Officer, David leads the scientific research operations at Flare Systems. A PhD in criminology from the Université de Montréal, he focuses his research on illicit markets on the internet and the darknet. His findings, published in over 40 articles over the last 10 years, have provided insights into the structure and inner workings of the criminal underground.