Can You Detect and Block the Evasive Threat of Lateral Movement?

Presented by

Rich Peckham, Sr. Solution Architect, Silverfort, and Mike Carroll, Sr. Sales Engineer, Silverfort

About this talk

After the initial breach, hackers need to progressively move through a network, in their search for target data and assets. Lateral movement is a term that refers to techniques they use. Join us for a talk about the use of lateral movement techniques in various attacks. Rich and Mike will explain what lateral movement is, and show some attack demos. We will discuss the importance of detecting and blocking these attacks early on and demonstrate how it can be done.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (23)
Subscribers (1279)
Silverfort extends secure authentication and Zero Trust policies across all sensitive assets, on-premises or in the cloud, without agents or proxies. This includes systems and interfaces that couldn't be protected until today like IT infrastructure, homegrown and legacy applications, file shares, databases, IoT devices and more. In addition, Silverfort extends protection to interfaces and access tools that currently allow attackers to bypass all other MFA solutions (Remote PowerShell, PsExec, etc.)