How "Tunnels" Are Used by Cybercriminals to Steel Data From Under Your Nose

Meet us in Toronto! We invite you to uncover how cybercriminals bypass even the strongest defenses—based on a real case where hackers remained undetected for two years in a Swiss defense contractor’s network.

 

(This article/event is only availabe in English.)

Join us for an informative and engaging event that will shed light on the stealthy tactics used by cybercriminals to bypass even the most robust security defenses.

Learn from a real-life case study of a successful breach on a Swiss Defense Contractor where hackers maintained network access for two years without detection and stole critical data.

Our discussion will delve into:

  • The Tunnel methods employed by cybercriminals to gain initial access to a network.
  • The techniques used to maintain long-term access and evade detection.
  • The responses and countermeasures developed to address the breach.
  • The valuable lessons learned from this high-profile incident.

Don't miss this opportunity to network with leaders in cyber security, to stay ahead of the latest threats and to strengthen your organization's security posture.
 

We look forward to seeing you

Date: Tuesday, February 25, 2025
Time: 11:00 am - 1:00 pm
Venue: Torkin Manes LLP, 151 Yonge Street, Suite 1500, Toronto, ON, M5C 2W7.

This is a free event presented by Compass Security (Canada) Network Computing Inc., hosted by Torkin Mannes LLP, a Toronto-based full-service law firm with affiliations across Canada and around the world.

 

Registration

Capacity is limited, please register to attend. Complentary lunch will be served.

Reserve your seat: Eventbrite.com


Learn more about the Toronto office of Compass Security here