Menu

Quick Look: The Pivot

In today’s threat landscape, the attacker is an insider. Whether a state-sponsored actor or cybercriminal, attackers typically first compromise the endpoint with a client-side exploit and then pivot. In this session, we take a deep dive into how attackers pivot through organizations, identify the telltale signs of a pivot, and most importantly, identify steps for defending against it.

Speaker

Headshot

Jonathan Trull Global Chief Cybersecurity Advisor, Microsoft

← View more Videos

This document was retrieved from http://www.rsaconference.com/videos/quick-look-the-pivot on Tue, 28 Mar 2017 19:29:41 -0400.
© 2017 EMC Corporation. All rights reserved.