Posted on
in Presentations
Picture this. You’re presenting to corporate management when suddenly a message pops up on your screen. Your company is on the brink of a security crisis. This can’t be put on hold. You have to act, now. In a real-time, real-world demo featuring a complex supply chain attack fueled by rapid internal lateral movement, this session will address one of today’s most challenging attacks.
Learning Objectives:
1: Understand supply-chain malware attacks, and why they are so difficult to detect and stop.
2: Learn how analytics of server behavior can be used to detect malicious lateral movement.
3: Explore how to contain and remediate advanced attacks with automated enforcement.
Pre-Requisites:
Knowledge of mechanisms for worm propagation, C&C and lateral movement. Understanding of vulnerabilities exploited by worms, such as SMB. Knowledge of mechanisms for logical server segmentation.
Learning Objectives:
1: Understand supply-chain malware attacks, and why they are so difficult to detect and stop.
2: Learn how analytics of server behavior can be used to detect malicious lateral movement.
3: Explore how to contain and remediate advanced attacks with automated enforcement.
Pre-Requisites:
Knowledge of mechanisms for worm propagation, C&C and lateral movement. Understanding of vulnerabilities exploited by worms, such as SMB. Knowledge of mechanisms for logical server segmentation.
Share With Your Community