Uncover and Remediate Toxic Combinations with Attack Path Analysis [EMEA]

Presented by

Jane Man Director, Product Management- VRM & Jeffrey Gardner Practice Advisor - Detection & Response at Rapid7

About this talk

In an ever-evolving digital landscape, businesses face unprecedented challenges in securing their critical assets from a myriad of cyber threats. Particularly at enterprise scale, it’s not uncommon to have hundreds of thousands of resources running across your cloud environments at any given time, these resources are all interconnected which can mean that if one resource or account is compromised, the whole system is at risk. Should a bad actor gain access to your systems via an open port, there are a number of avenues for them to move laterally across your environment, and even across environments, if your cloud environment is connected to your on-premises network. Join us for our insightful webinar, where Jane Man (Dir. Product Management, VRM) and Jeffrey Gardner (Practice Advisor, D&R) will delve into the innovative approach of identifying and mitigating threats posed by toxic combinations. This session will empower security professionals, IT administrators, and decision-makers with the knowledge and tools needed to bolster their organisation's defense strategy. Webinar Highlights: - Toxic Combinations Unveiled: Explore the concept of toxic combinations and understand how seemingly benign actions can cascade into critical security breaches. Learn about real-world examples that demonstrate the impact of such attacks. - Attack Path Analysis: Visualise real-time risk across cloud environments - Case Studies and Best Practices: Delve into case studies that showcase the successful application of attack path analysis in different industries.
Related topics:

More from this channel

Upcoming talks (24)
On-demand talks (620)
Subscribers (53580)
Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure to the dark web. We foster open source communities and cutting-edge research–using these insights to optimize our products and arm the global security community with the latest in attackers methods. Trusted by more than 10,000 customers worldwide, our industry-leading solutions and services help businesses stay ahead of attackers, ahead of the competition, and future-ready for what’s next.