Our presenters are experts in cyber warfare, network architecture, and ethical hacking, providing thought leadership on cybersecurity topics.
You just purchased the latest and greatest Next Generation Firewall and are ready to protect your Public Safety Agency from the nastiest cyber threats out there – at least that is what you thought. Despite your purchase, your network may still have Advanced Persistent Threats lurking; may still have Cryptojacking software on your CAD; may still succumb to a Remote Desktop Protocol attack that brute-force hacks your CAD; may miss the lateral Ransomware attack on your 911 CPE from your Web permit server. How could this happen? The best firewalls can be bypassed by sophisticated phishing attacks or unpatched servers exposed to the internet. Hackers can penetrate a firewall where the rules are entered too broadly or where the complex rules made mistakes easy to make. In short, Hackers Love Your Misconfigured Firewalls.