Webinar: How to Stop Attacker Movement in Your Network Before They Reach Your Crown Jewels

stop_attacker_movement

 

During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort and impossible to scale.

In this webinar, carried out in partnership with KuppingerCole, we examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your crown jewels.

Among the topics discussed:

  • How normal business activity creates dangerous opportunities for malicious lateral movement
  • The cyber hygiene functions needed to harden the network against modern APT attacks
  • How continuous visibility into your attack surface can augment other core security functions, such as privileged access management (PAM) and vulnerability management

 

In the first part of the webinar, KuppingerCole’s Lead Analyst Alexei Balaganski talks about the risks and challenges modern hyper-connected businesses are facing and about finding the balance between real-time visibility into ongoing attacks and proactive infrastructure hardening that would prevent them from happening.

In the second part, Wade Lance, Field CTO at Illusive Networks, dives into the details of implementing this approach. He will talk about automating the discovery, management and ultimate reduction of your company’s attack surface, easily and at scale.