Detecting malicious actors who attempt to compromise credentials that access your IT assets

Start adding items to your reading lists:
or
Save this item to:
This item has been saved to your reading list.

PwC cybersecurity professionals provide an inside glimpse into cyber attacks and reveal tactics and techniques that are common and yet often go undetected. PwC arms you with ways to mitigate the threat actors and their methods to exploit prevalent exposures.

This Incident and Threat Management series is for cyber specialists on the frontlines who want to confidently weaken adversaries. The introductions to each issue are a 1-minute brief for executives who want to understand the fundamental challenges.

PwC uses the MITRE ATT&CK framework and knowledge base of adversary tactics and techniques based on real-world observations.

This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.

Contact us

Christopher Morris

Principal, Global Secure Terrain Leader, PwC US

Gerasimos J. Stellatos

Principal, Cybersecurity and Privacy, PwC US

Kevin Simmonds

Principal, Cybersecurity & Privacy, PwC US

Amandeep Lamba

Principal, Cybersecurity and Privacy, PwC US

Emily Stapf

Cybersecurity, Privacy & Forensics Integrated Solutions Leader, PwC US

John Boles

Principal, Cybersecurity and Privacy, PwC US

Follow us