webinar register page

Webinar banner
AISA Webinar: Brute forcing landscape: Attacks, tools and tactics
Join Brett Williams, Lead Solutions Architect at Flashpoint for an online discussion on the various types of attacks, tools being utilized to complete them, and the actors who execute them.

With databases being offered for sale every day that often contain millions of usernames and passwords from various sources, credentials are being sold and repackaged, giving threat actors access to all of that data to carry out credential stuffing attacks.

During this presentation Brett will provide an inside look at the brute forcing landscape and cover the following topics:
- The illicit trade of credentials, from acquisition, combo lists, testing to account take over and sale
- Brute forcing tools and configurations
- Strategies that companies use to identify and block brute forcing attacks.

Participants will have the opportunity to ask questions. This webinar will be recorded and the recording will be made available to registrants.

This webinar is proudly sponsored by Flashpoint

Nov 25, 2020 10:00 AM in Canberra, Melbourne, Sydney

* Required information
Loading

By registering, I agree to the Privacy Statement and Terms of Service.

Register

Speakers

Brett Williams
Lead Solutions Architect-Asia Pacific and Japan @Flashpoint
As Lead Solutions Architect at Flashpoint, Brett works with clients to help them use intelligence within their enterprises and how deep and dark web monitoring should be an integral part of any threat intelligence program. He is responsible for providing relevant intelligence and services to address various use cases including, insider threat, cyber intelligence, anti-fraud, physical security and counterterrorism. Brett is widely recognized for his extensive and in-depth knowledge of the security landscape. He has experience working across industry sectors including finance, government, law enforcement, healthcare and education. He has over 28 years’ experience working in information technology and security with a focus on incident response, intelligence, security operations and digital forensics.