Defending the MSP tool stack in a zero-day world

Published by

Bad actors continue to target MSP tools as an entry point into downstream networks. This leaves the MSP with the unenviable task of defending against sophisticated attackers.

This session will cover how MSPs can protect against mass attacks against self-hosted systems. By the end of this session, you’ll understand how to stop would-be attacks at the reconnaissance, weaponization, delivery, and exploitation phases — before they damage your MSP and your clients.

Categorised in:

This post was written by goots