Credential Theft: A Perspective From the FBI & Unit 42 Threat Intel Team

Logo
Presented by

SSA John Caruthers, FBI & Jen Miller-Osborn Palo Alto Networks

About this talk

Even the most sophisticated adversaries know it’s far easier to steal credentials and use them for covert activities than it is to locate a zero-day vulnerability in an external-facing system. Plus, since attackers will take the easiest path, most breaches still rely on stolen credentials. Join the FBI and our own Unit 42 threat intelligence team as they present their insightful perspective on the cyberthreat landscape in 2017, with an emphasis on credential-based attacks and phishing. In addition to presenting their unique attack lifecycle, they will: * Identify trends and techniques in methods used for credential theft and abuse. * Review how cybercriminals have changed their tactics to compromise networks. * Examine who is being targeted, and why. * Discuss techniques to stop credential leakage. * Review the FBI’s role in combating this destructive attack. Defending against cyberattacks is tough enough, especially when attackers pose as authenticated users on your network. Join the FBI and Palo Alto Networks® Unit 42 to learn what to do when you discover intruders on your network, and how to prevent their attacks from succeeding
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (853)
Subscribers (104244)
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.