Attackers who live off the land - how to stop them by starving them

Thursday, May 23, 2019
2:00 p.m. ET/ 11:00 a.m. PT

Cyberattackers and insider threats increasingly rely on living-of-the-land techniques to evade detection as they move toward critical systems. Every day, users and processes in your network leave goodies for attackers—credentials and connections that enable lateral movement and network persistence. 
 
In this upcoming webcast, we’ll examine ways to deprive attackers of what they need to move laterally in your network.
 
Join us to discuss:
  • How normal business activity creates dangerous opportunities for malicious lateral movement
  • The cyber hygiene functions needed to harden the network against LotL-style attacks
  • How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management.
SC Vendor Webcast
 
Cyberattackers and insider threats increasingly rely on a living-off-the-land techniques to evade detection as they move toward critical systems. Every day, users and processes in your network leave goodies for attackers—credentials and connections that enable lateral movement and network persistence. 
 
In this upcoming webcast, we’ll examine ways to deprive attackers of what they need to move laterally in your network.
 
Join us to discuss:
How normal business activity creates dangerous opportunities for malicious lateral movement
The cyber hygiene functions needed to harden the network against LotL-style attacks
How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM
Presenter
Chad Gasaway
Director of Sales Engineers
Illusive Networks
View Biography

Registration details:

By registering you are accepting our Privacy Policy and Terms of Use.

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.

(*) denotes required form field(s)

Submit