How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”
- LANGUAGE: English DATE: Thursday, September 12, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.
During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort— impossible at scale.
In this KuppingerCole webinar, we are going to examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your “crown jewels”.
Join us to discuss:
- How normal business activity creates dangerous opportunities for malicious lateral movement
- The cyber hygiene functions needed to harden the network against modern APT attacks
- How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management
In the first part of the webinar, KuppingerCole’s Lead Analyst Alexei Balaganski will talk about the risks and challenges modern hyperconnected businesses are facing and about finding the balance between real-time visibility into ongoing attacks and proactive infrastructure hardening that would prevent them from happening.
In the second part, Wade Lance, Principal Solution Architect from Illusive Networks will dive into details of implementing this approach. He will talk about automating the discovery, management and ultimate reduction of your company’s attack surface, easily and at scale.
Totseret Ha-Arets St. 7 • 6789104 Tel Aviv-Yafo • Israel
Illusive Networks stops cyberattacks by destroying attackers’ ability to make decisions as they move toward their targets. Illusive’s simple, agentless solutions eliminate high-risk pathways to critical systems, detect attackers early, and capture real-time forensics to minimize incident impact so that organizations can function with greater confidence and cyber agility.
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.