How to Recon like an attacker

To effectively hunt for threats in your enterprise, you need to not only know what compromise looks like but to be able to predict where attackers are most likely to be. This ebook will walk you through how attackers profile an organization and the thinking behind where, when, and how they decide to attack an organization. In this session, you’ll gain strategies you can employ to prioritize where to hunt and some tips for how you can stay one-step ahead of your adversary.