How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”
- LANGUAGE: English DATE: Thursday, September 12, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.
During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort— impossible at scale.
In this KuppingerCole webinar, we are going to examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your “crown jewels”.
Join us to discuss:
- How normal business activity creates dangerous opportunities for malicious lateral movement
- The cyber hygiene functions needed to harden the network against modern APT attacks
- How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management
In the first part of the webinar, KuppingerCole’s Lead Analyst Alexei Balaganski will talk about the risks and challenges modern hyperconnected businesses are facing and about finding the balance between real-time visibility into ongoing attacks and proactive infrastructure hardening that would prevent them from happening.
In the second part, Wade Lance, Principal Solution Architect from Illusive Networks will dive into details of implementing this approach. He will talk about automating the discovery, management and ultimate reduction of your company’s attack surface, easily and at scale.
Totseret Ha-Arets St. 7 • 6789104 Tel Aviv-Yafo • Israel
lllusive continuously discovers and automatically mitigates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks.
Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organization’s endpoints and servers, then eliminate them or deploy deception-based detection techniques as a compensating control to stop attackers. Illusive has participated in over 140 red team exercises and has never lost one!
Founded by nation state attackers, Illusive’s technology is trusted by large global financials, retailers, services organizations, and pharmaceuticals.
At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.