With the release of MITRE Shield tactics, Deception has been identified as an essential capability to help thwart attackers. But what deception techniques are the best to protect your organization? In this live technical training, Tony Cole, Chief Technology Officer at Attivo Networks, and Paul Asadoorian, Chief Innovation Officer at CyberRisk Alliance, will go into the details of the adversary playbook. How do attacks start and propagate? What deception techniques actually work to thwart these attacks?
Tony and Paul focus on the following uses cases:
1. Phishing attacks to harvest credentials
2. Lateral attacks on active directory harvest additional credentials and devices
3. Propagate ransomware across multiple systems and data repositories