Learn about the ways in which cyber criminals attack businesses, using Arthurian legend analogies.
STORM Guidance have put together an interactive presentation outlining the methods cyber criminals use to compromise businesses. To keep things interesting, we're using analogies from Arthurian legend as a general theme.
Methods covered
In this presentation we cover the key methods of attack, including:
Ransomware
Remote Access Trojans (RAT)
Advanced Persistent Threats (APT)
Distributed Denial of Service (DDoS)
Business Email Compromise (BEC)
Phishing
Interactive presentation
Check out the presentation below:
Note: This is best viewed on a desktop. For a fuller experience, set your browser to full screen.
Comments