How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”
- LANGUAGE: English DATE: Thursday, September 12, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Identify and remove the riskiest pathways before it’s too late
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.
During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort— impossible at scale.
In this KuppingerCole webinar, we are going to examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your “crown jewels”.
Join us to discuss:
- How normal business activity creates dangerous opportunities for malicious lateral movement
- The cyber hygiene functions needed to harden the network against modern APT attacks
- How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management
In the first part of the webinar, KuppingerCole’s Lead Analyst Alexei Balaganski will talk about the risks and challenges modern hyperconnected businesses are facing and about finding the balance between real-time visibility into ongoing attacks and proactive infrastructure hardening that would prevent them from happening.
In the second part, Wade Lance, Principal Solution Architect from Illusive Networks will dive into details of implementing this approach. He will talk about automating the discovery, management and ultimate reduction of your company’s attack surface, easily and at scale.
Totseret Ha-Arets St. 7 • 6789104 Tel Aviv-Yafo • Israel
Illusive Networks stops cyberattacks by destroying attackers’ ability to make decisions as they move toward their targets. Illusive’s simple, agentless solutions eliminate high-risk pathways to critical systems, detect attackers early, and capture real-time forensics to minimize incident impact so that organizations can function with greater confidence and cyber agility.
The past few months have not only been disruptive to business models, but also to the way many people work. Working from Home (WfH) is the new normal for many of us, but it comes with many challenges, for workers, for their managers, for the IT teams. One of the biggest challenges is finding the right balance between enabling WfH and security.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.