Killing the Kill Chain: Disrupting the Cyber Attack Progression
Exploits for high impact vulnerabilities are often made available minutes after being announced. A point of ingress is identified, malware spreads, privileges are escalated, and exfiltration of high value data begins. As Hudson said, "Game over, man! Game Over!" Or is it? Join us, as we stop attacks before they start, identify hacks already in progress and, ultimately, ruin the attacker's day.