June 6, 2023, 6:12 p.m. | RSA Conference

RSA Conference www.youtube.com

Presenters:
Tony Anscombe, Chief Security Evangelist, ESET
Cameron Camp, Specialized Security Researcher, ESET

Exploiting a vulnerability or spearphishing for credentials is hard work. But, someone can easily purchase them on the sprawling secondary hardware market. Presenters in this session tested the hypothesis that decommissioning processes may not wipe a device clean, leaving critical data from the previous owner accessible and open to abuse. Come hear what was accessed and the potential damage it could cause.

https://www.rsaconference.com/usa/agenda/session/We%20Could%20Have%20Cracked%20Open%20the%20Network%20for%20Under%20100

camp chief cracked credentials device eset exploiting hard hardware market may network processes researcher security security evangelist security researcher session spearphishing under vulnerability work

Information System Security Officer (ISSO)

@ LinQuest | Boulder, Colorado, United States

Project Manager - Security Engineering

@ MongoDB | New York City

Security Continuous Improvement Program Manager (m/f/d)

@ METRO/MAKRO | Düsseldorf, Germany

Senior JavaScript Security Engineer, Tools

@ MongoDB | New York City

Principal Platform Security Architect

@ Microsoft | Redmond, Washington, United States

Staff Cyber Security Engineer (Emerging Platforms)

@ NBCUniversal | Englewood Cliffs, NEW JERSEY, United States