Skip to main content
Loading

What I Learned Cleaning Up After 100+ Cyber Attacks

October 15, 2025
Theater 6 LV

Businesses are getting hacked through the same predictable attack patterns. This session reveals the five critical security gaps found in every compromised organization through real breach case studies.

You'll discover how attackers consistently exploit unmonitored VPN devices, poorly configured edge firewalls, and unrestricted remote management tools. Most compromised businesses lack basic VPN log retention, proper restrictions on RMM binaries, controls on enterprise applications, and effective multi-factor authentication deployment.

This isn't theoretical cybersecurity – it's battlefield intelligence from cleaning up after ransomware groups and advanced persistent threats. Each recommendation includes specific implementation guidance for resource-constrained SMBs, covering VPN logging configuration, RMM binary restrictions, application controls, and MFA deployment.

You'll leave with a prioritized action plan focusing on security controls that provide maximum protection against the most common attack vectors. Whether you're a business owner or IT professional, you'll understand exactly where attackers strike first and how to close those gaps before becoming the next headline.

Speakers
Ryan Vital, Founder - Find Evil