We (Could Have) Cracked Open the Network for Under $100
On-demand
Duration: 30 minutes

Are you creating a potentially massive vulnerability when decommissioned hardware leaves the premises?

Exploiting a vulnerability or spearphishing for credentials is hard work. But, someone can easily purchase them on the sprawling secondary hardware market.

Presenters in this session tested the hypothesis that decommissioning processes may not wipe a device clean, leaving critical data from the previous owner accessible and open to abuse. Come hear what was accessed and the potential damage it could cause.

Register by filling out the form below.

You can unsubscribe at any time. See our Privacy Policy for more details.
© 2008- ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. All other names and brands are registered trademarks of their respective companies.

By submitting my contact information above, you authorize ESET to send communications about its products and services. View our privacy policy.