John, over the years, IT organizations have approached network security from an enterprise point of view, establishing a perimeter of known devices and defending it with firewalls and security gateways. But today’s online attackers often bypass these defenses, entering the network through third-party networks or through stolen credentials. In this eye-opening InformationWeek webinar, you'll: Learn from a top penetration tester who will offer an attacker's view of networking security Gain an understanding of the methods attackers use to break in Get insight on the most common methods used to crack network defenses Leave with recommendations on how you can stop attackers