How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

In order to watch this video, you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the video statistics.

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort— impossible at scale.

In this KuppingerCole webinar, we examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your “crown jewels”.

Language: English • Duration: 01:01:30 • Resolution: 1280x720

Learn more about this webinar

Latest Related Videos

More Related Videos

Stay Connected

KuppingerCole on social media

Next Webinar

Webinar

Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00