InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Bootcamp Series Part 2: Disrupting the Attacker’s Toolkit - During the Attack

Presented by

Joseph Salazar, Technical Deception Engineer, CISSP, CEH, EnCE

About this talk

Attackers are increasingly targeting enterprise identities to impersonate users, allowing them to evade defenses, elevate privileges, acquire targets, and compromise them. Watch this boot camp webinar series to understand and learn how to detect an attack early in the process, derail and misdirect an attacker’s next move, and gather forensic information for a stronger defense. Part 2 – Disrupting the Attacker’s Toolkit – Detect, Hide and Deny, Engage • Derail Attacks – Detect and Respond See how deception and concealment technologies misinform and misdirect attacks with decoy objects and credentials, derailing their activities while providing early warning. • Engage Attackers – Gather Threat Intelligence Learn how full OS decoys engage attackers and record their activities, capturing forensic data to create threat intelligence and strengthen defenses.
Attivo Networks

Attivo Networks

5371 subscribers30 talks
Prevent Lateral Movement and Privilege Escalation
Attivo Networks closes the cyber security detection deficit with dynamic deception that accurately and efficiently reveals in-network threats and their lateral movement.
Related topics