5000: Understanding vulnerabilities to better mitigate threats

Document created by tinacostilla on Sep 14, 2012Last modified by tinacostilla on Jul 8, 2014
Version 2Show Document
  • View in full screen mode

5000

Understanding vulnerabilities to better mitigate threats

Speaker: Steve Povolny, HP

Vulnerabilities in today's commercial and custom software are the primary target for attackers. The most severe are vulnerabilities that can result in code execution—ones that allow an attacker can take complete control of your system and steal information or damage property. In this session, we’ll show you how to analyze a vulnerability in a Microsoft application and how an attacker can quickly move from proof-of-concept to remote code execution. We’ll also share risk mitigation strategies.

 

Attachments

Outcomes