How Hackers & Pen Testers Check for Misconfigurations & Vulnerabilities

Paula Januszkiewicz, Security MVP, CEO at CQURE

Paula Januszkiewicz, Security MVP, CEO at CQURE

Paula Januszkiewicz, CEO CQURE, penetration tester and mentor of CQURE Academy. Paula is also an Enterprise Security MVP and trainer (MCT) and Microsoft Security Trusted Advisor. She is also a top speaker at many well-known conferences including TechEd North America, TechEd Europe, TechEd Middle East, RSA, TechDays, CyberCrime, etc., and is often rated as number-one speaker. Paula is engaged as a keynote speaker for security related events and she writes articles on Windows Security. Her company CQURE has now 3 locations New York, Dubai and Warsaw. Paula has conducted hundreds of IT security audits and penetration tests, including those for governmental organizations, she is a renowned security consultant. Her distinct specialization is related to Microsoft security solutions in which she holds multiple Microsoft certifications, besides being familiar with and possessing certifications in other related technologies and operating systems. Paula is passionate about sharing her knowledge with others. In private, she enjoys researching new technologies, which she converts to authored trainings. She wrote a book about Threat Management Gateway 2010, and is working on her next book. She has access to a source code of Windows! Every year she makes over 200 flights (2013 - 248) to gain more and more experience, provides penetration tests and consults Customers about how to secure their infrastructures. Her favorite saying is: "I have a tool for that!"

About this Webinar

In this on-demand webinar, Enterprise Security MVP and Microsoft Security Trusted Advisor, Paula Januszkiewicz, demonstrates attacker bypassing techniques, discusses the prevention methods admins should use in order to avoid the latest attacks, and explains why vulnerability management is such an important facet to your overall security strategy. Tune in to learn: Different techniques used by hackers that can be useful for reviewing the infrastructure

  • Techniques that are useful for administrators
  • Weak points that administrators should pay attention to

Take a journey to the darker side of IT security with Paula, and use this knowledge for making good decisions in your enterprise vulnerability management strategy.