How to make your network resistant to lateral movement

Logo
Presented by

John Leadford, Dir. Enterprise USA & Moshe Elias, Director of Product Marketing, Cymulate

About this talk

After gaining an initial foothold a hacker will use known techniques to propagate within your network in search of their objective. These techniques enable them to cloak their presence and escalate privileges to access high value assets undetected. Many of the techniques rely on vulnerability exploits, network misconfigurations and other weaknesses. Attend this webinar where we will discuss ➤ Lateral movement tactics & techniques ➤ How to discover network weaknesses that enable lateral movement ➤ What you can do to make your network more resistant to lateral movement

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (65)
Subscribers (8819)
Cymulate Extended Security Posture Management solutions enable companies to challenge, assess and optimize their cybersecurity posture against evolving threats, simply and continuously.