Lateral Movement Techniques and How to Detect Them

Presented by

Jeff Warren, SVP, Products at Stealthbits

About this talk

Lateral movement techniques are leveraged by attackers to move throughout a network, slowly increasing privileges until they achieve their end goal. Pass-the-Hash, Pass-the-Ticket, and Overpass-the-Hash are three of the most common lateral movement methods performed on Windows systems. In this webinar, General Manager of Products, Jeff Warren takes a deep dive into these attack methods. View the recording to learn: What to look for and how to understand Active Directory lateral movement attacks Practical approaches on how to detect them

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (95)
Subscribers (2832)
Netwrix empowers information security and governance professionals to reclaim control over sensitive, regulated and business-critical data, regardless of where it resides. Over 10,000 organizations worldwide rely on Netwrix solutions to secure sensitive data, realize the full business value of enterprise content, pass compliance audits with less effort and expense, and increase the productivity of IT teams and knowledge workers.