How a Hacker Attacks their Target
10/09/2018
KPMG Tauranga Office | 247 Cameron Road - Level 2, Tauranga, Bay of Plenty
Agenda
12:00-12:15 | Arrivals & Networking |
12:15-12:30 | Welcome and Cyber Security News Update, Jon Edney [CISSP, CEH,CIPT] |
12:30-13:30 | How a Hacker Attacks their Target, Win Amann, Certified Ethical Hacker, Pro.Security |
13:30-13:45 | Networking |
Summary
Win Amann is a cybersecurity consultant and a Certified Ethical Hacker (CEH) with 20+ years of experience in different fields of IT (network administration, programming). Winfried’s focus is vulnerability assessment and implementing effective security controls that will reduce your attack surface significantly.
Topics:
- Information gathering about your network (Reconnaissance).
- How a hacker maps the network of his target.
- “Google Hacking Techniques” to gain access to your documents, photos or even security cameras.
- How physical access can be exploited within seconds.