Network Threats: A Step-by-step Attack Demonstration (Master Class: Episode 17)

Logo
Presented by

Etay Maor; Dolev Attiya; Matan Mittelman

About this talk

We often hear about the two ends of an attack lifecycle – how threat actors gain entry and the resulting impact. But what happens in between? Much of an attack occurs between these two events – on the network. With average dwell times exceeding six months until detection, what actions do threat actors take during this period to evade discovery, ensure persistence, and maintain awareness of their location on the network? Join Cato’s Security Experts: Dolev Attiya, Staff Security Engineer; Matan Mittelman, Security Research Team Leader; and Etay Maor, Senior Director Security Strategy, as they explore the actions of threat actors on networks. They'll demonstrate the tools, tactics, and techniques used during a breach. Using MITRE ATT&CK as a guideline, the Cato team illustrates each step in detail. From Living on the Land (LOL) attacks and network discovery. to lateral movement, persistence, credential dumping, and more – witness an attack unfold! Register now to discover: The various methods threat actors employ to breach a network Insights into the motivations behind these actions and their reliance on previous and future steps of the breach Effective strategies for defenders to detect, mitigate, and prevent these threats, emphasizing the importance of a holistic view of the attack lifecycle
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (199)
Subscribers (13945)
Cato Networks provides organizations with a cloud-based and secure global SD-WAN that replaces rigid and expensive MPLS and network security point products -- to power the digital business. Cato connects all data centers, branches, mobile users, and cloud resources into a global, optimized cloud network that is tightly secured by a cloud-based network security stack and backed by expert managed security services. Cato cuts MPLS costs, improves performance between global locations and to cloud applications, eliminates branch appliances, provides secure Internet access everywhere, and seamlessly integrates mobile users and cloud datacenters into the WAN.