It’s happened. A sophisticated attacker has chosen your enterprise as its next target, and is now developing a plan to find every possible avenue into your systems and data. What does that plan look like? How will it be executed? In this virtual event keynote session, "Profile of an Online Attack" a top penetration tester will:Describe the many methods used to discover and exploit vulnerabilitiesGive you a step-by-step look at how a sophisticated attacker would research, assess, and exploit your enterprise assetsExplain what you can do to stop them Come for the session or stay for the day as industry top experts on cyber threats and incident response join with Dark Reading editors to take you into the world of online crime.