You can't defend against what you don't understand! To protect organizational assets from compromise you need to know how the attacker is going to act. This talk is intended to be a mostly non-technical talk that won't show you how to do it but shows you how it's done.
The seven steps covered are:
1. Reconnaissance
2. Scanning
3. Initial Point of Compromise
4. Lateral Movement
5. Data Exploitation
6. Creating Back Doors
7. Cleaning Up