Picture this. You’re presenting to corporate management when suddenly a message pops up on your screen. Your company is on the brink of a security crisis. This can’t be put on hold. You have to act, now. In a real-time, real-world demo featuring a complex supply chain attack fueled by rapid internal lateral movement, this session will address one of today’s most challenging attacks.
1: Understand supply-chain malware attacks, and why they are so difficult to detect and stop.
2: Learn how analytics of server behavior can be used to detect malicious lateral movement.
3: Explore how to contain and remediate advanced attacks with automated enforcement.
Knowledge of mechanisms for worm propagation, C&C and lateral movement. Understanding of vulnerabilities exploited by worms, such as SMB. Knowledge of mechanisms for logical server segmentation.
Analytics Intelligence & Response Protecting Data & Applied Crypto
incident response security & threat visualization security analytics supply chain threat intelligence
Share With Your Community