The Adversary Playbook - How Deception Thwarts the Attacker

Logo
Presented by

Tony Cole, Chief Technology Officer | Attivo Networks & Paul Asadoorian, Chief Innovation Officer | CyberRisk Alliance

About this talk

With the release of MITRE Shield tactics, Deception has been identified as an essential capability to help thwart attackers. But what deception techniques are the best to protect your organization? In this live technical training, Tony Cole, Chief Technology Officer at Attivo Networks, and Paul Asadoorian, Chief Innovation Officer at CyberRisk Alliance, will go into the details of the adversary playbook. How do attacks start and propagate? What deception techniques actually work to thwart these attacks? Tony and Paul focus on the following uses cases: 1. Phishing attacks to harvest credentials 2. Lateral attacks on active directory harvest additional credentials and devices 3. Propagate ransomware across multiple systems and data repositories

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (41)
Subscribers (4532)
Attivo Networks closes the cyber security detection deficit with dynamic deception that accurately and efficiently reveals in-network threats and their lateral movement.