Breaching the Perimeter: The Forgotten Attack Vector That Always Works
Ever wondered what APTs do when high-value targets actually implement strong information security practices, making the company appear impregnable? In this talk, we’ll explore the critical role that physical security plays in Red Team engagements and reveal ten methods attackers can use to infiltrate your company’s premises to steal data, access computers, deploy “dropboxes” on networks, or leave behind hidden cameras or listening devices.