Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore the evolution of modern cyber threats in this comprehensive conference talk that examines how attack methodologies have fundamentally transformed from traditional reconnaissance to automated, large-scale asset exploitation. Discover how threat actors now operate at machine speed, often compromising systems before defenders realize they're under attack, and learn why conventional security assumptions about asset visibility and control may be dangerously outdated. Analyze common attack surface management failures including misconfigurations, blind spots in internet-facing assets, shadow IT vulnerabilities, and overreliance on existing visibility tools that frequently lead to successful breaches. Understand the critical concept that your attack surface is dynamic and constantly changing, requiring defenders to adopt attacker mindsets by continuously mapping, validating, and prioritizing exposed assets at scale. Gain practical insights through live demonstrations on conducting large-scale automated reconnaissance against external footprints, identifying unknown exposed assets such as legacy services and forgotten subdomains, recognizing attack surface mistakes that provide initial footholds for breaches, and reevaluating visibility assumptions in complex hybrid environments. Learn to prioritize remediation and monitoring for high-risk internet-facing assets based on real-world attacker behavior patterns, and develop adaptive attack surface management strategies that can keep pace with increasingly automated and faster-moving threats in today's cybersecurity landscape.
Syllabus
Date & Time: 8th August 2025, 10:00am – 10:50am 40-minute comprehensive talk
Taught by
Recon Village