Webcast

Sponsored by: Star Lab
Nov 03, 2022 9AM EDT(1 year, 5 months ago)
A brief foray into how attackers get root-level access, general attack flow and real world examples concluding with how we can use: defense in depth, threat models, and principles of least privilege and secure / immutable configurations to help secure our systems given an attacker has root-level execution.
Moderator: Rich Nass, Executive Vice-President, Embedded Franchise, OpenSystems Media
Presented by: Jonathan Kline, CTO, Star Lab