Storming the Breach, Part 1: Initial Infection Vector


Gear up and join Rapid7's incident response team for part 1 of our "Storming the Breach" series; a technical discussion on breach investigation methodologies. In this session, Mike Scutt and Wade Woolwine will:

  • Discuss three common breach scenarios
  • Share methods they use in the field to validate and investigate root cause
  • Walk attendees through spear-phishing, web browser exploitation, and strategic web compromises
  • Outline the investigative steps required to determine how the compromise occurred

Speakers: Mike Scutt, Senior Consultant for Analytic Response, Strategic Services, Rapid7 | Wade Woolwine, Manager of Strategic Services, Rapid7

Fill out the form to watch the webcast