{"id":19728,"date":"2025-08-19T09:31:19","date_gmt":"2025-08-19T13:31:19","guid":{"rendered":"https:\/\/events.iofm.com\/conference-fall\/session\/inside-the-hackers-playbook\/"},"modified":"2025-11-07T06:01:26","modified_gmt":"2025-11-07T11:01:26","slug":"inside-the-hackers-playbook","status":"publish","type":"session","link":"https:\/\/events.iofm.com\/conference-fall\/session\/inside-the-hackers-playbook\/","title":{"rendered":"Inside the Hacker&#8217;s Playbook"},"content":{"rendered":"<p>In this live, interactive session, Mike Wright will take attendees inside the mind of a hacker \u2014 showing how bad actors research, target, and infiltrate finance departments using publicly available information and common business processes. Step by step, you\u2019ll follow a simulated attack from the first phishing email to the final ransomware demand. This session isn&#8217;t about scaring you \u2014 it\u2019s about preparing you. You\u2019ll leave knowing exactly how these attacks work and what changes you can make now to shut the door before it opens.<\/p>\n<p>Top Takeaways:<\/p>\n<ul>\n<li>How hackers select and research finance targets<\/li>\n<li>What vulnerabilities they&#8217;re exploiting in real companies<\/li>\n<li>Changes to make today to become a harder target<\/li>\n<\/ul>\n","protected":false},"excerpt":{"raw":"In this live, interactive session, Mike Wright will take attendees inside the mind of a hacker \u2014 showing how bad actors research, target, and infiltrate finance departments using publicly available...","rendered":"<p>In this live, interactive session, Mike Wright will take attendees inside the mind of a hacker \u2014 showing how bad actors research, target, and infiltrate finance departments using publicly available&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","session_category":[43,131,54,69,169,32,165],"class_list":["post-19728","session","type-session","status-publish","hentry","session_category-accounts-payable","session_category-fraud","session_category-fraud-prevention","session_category-general-session","session_category-main-agenda","session_category-operations-compliance-security","session_category-wednesday-2025"],"thumbnail":[],"metadata":{"session_id":["bc13622f-acdf-42fb-bb86-09482585299e"],"session_speakers":[19249],"session_topics":[],"session_date":["2025-11-05 00:00"],"session_start":["2025-11-05 14:05"],"session_end":["2025-11-05 14:55"],"session_updated_at":[null],"session_display_priority":["3"],"session_weblink":[null],"session_sponsored_by":[null],"_eael_post_view_count":["386"],"session_room_number":["Milano III-IV"],"rank_math_analytic_object_id":["75"],"rank_math_internal_links_processed":["1"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/session\/19728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/types\/session"}],"author":[{"embeddable":true,"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/comments?post=19728"}],"wp:attachment":[{"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/media?parent=19728"}],"wp:term":[{"taxonomy":"session_category","embeddable":true,"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/session_category?post=19728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}