The Pivot

  • Friday, March 4, 2016 | 10:10 AM – 11:00 AM | West | Room: 2006

View all Sessions

In today’s threat landscape, the attacker is an insider. Whether a state-sponsored actor or cybercriminal, attackers typically first compromise the endpoint with a client-side exploit and then pivot. In this session, we take a deep dive into how attackers pivot through organizations, identify the telltale signs of a pivot, and most importantly, identify steps for defending against it.


This document was retrieved from on Sat, 10 Dec 2016 21:08:28 -0500.
© 2016 EMC Corporation. All rights reserved.