TechTarget and Informa Tech's Digital Businesses Combine.
Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.
How to make your network resistant to lateral movement
Presented by
John Leadford, Dir. Enterprise USA & Moshe Elias, Director of Product Marketing, Cymulate
About this talk
After gaining an initial foothold a hacker will use known techniques to propagate within your network in search of their objective. These techniques enable them to cloak their presence and escalate privileges to access high value assets undetected. Many of the techniques rely on vulnerability exploits, network misconfigurations and other weaknesses.
Attend this webinar where we will discuss
➤ Lateral movement tactics & techniques
➤ How to discover network weaknesses that enable lateral movement
➤ What you can do to make your network more resistant to lateral movement
Security Validation and Threat Exposure Management…
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.…