Once inside your network, most cyberattacks go sideways. They progressively move deeper in the network, laterally compromising other systems as they search for key assets and data. Would you spot this lateral movement in your enterprise environment?
Join us on October 18th for “Threat Hunting for Experts: How to Hunt for Lateral Movement in Your Environment,” as we review the various techniques attackers use to spread through a network, which data sets you can use to reliably find them, and techniques that can be used to help automate the detection of lateral movement. Specific topics covered will include:
- The attacker side
- The defensive side
- Suggested tools and techniques to detect these types of activities