The top list of securing developer workstations

202 May 20, 2022, 10:30 AM - 11:20 AM

Thomas Andolf

Security Consultant

Once malicious access to a computer in a company network has been obtained the second stage is try to gain full access to the entire domain. Did you know that once work has begun on the second stage 58% of breaches will gain full domain control within 2 hours! High value targets for threat actors are adminstrator accounts with high access privileges and credentials to many systems so developer workstations are potential gold mines! This talk will go through some of the top listed things you as a developer should think about daily to keep your workstation safer in a corporate environment.

 

Security

Get inspiration & news from us

I agree that Cornerstone will send me news via e-mail