InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Live Demo - Lateral Movement: Breaking Down & Identifying

Presented by

Terry Jenvey, Director of Sales Engineering EMEA

About this talk

In this Live Demo will be breaking down the subject of lateral movement and help identify what it looks like for the organization. Lateral movement is a big topic and one which is often led by vendors looking to sell their technologies to customers without customers really knowing whether it is required, also known as “lateral thinking on lateral movement”. Lateral movement can be broken down into 3 areas: 1. Using endpoint security testing to validate whether our investment in EDR will recognize and prevent lateral movement 2. Using the Lateral Movement module to evidence there are gaps in networking, privileged account management, and patching (and what to do if you can’t patch) 3. Using Advanced Scenarios to automate testing of specific lateral movement attack techniques
Cymulate Exposure & Security Validation

Cymulate Exposure & Security Validation

16889 subscribers125 talks
Security Validation and Threat Exposure Management
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.
Related topics