Detecting & Restricting Lateral Movement in Multi-Cloud Environments

Logo
Presented by

Chad Skipper, Global Security Technologist VMware

About this talk

If you can’t see it, you can’t protect it. Considering 44% of breaches perform some sort of lateral movement, that’s a lesson you don’t want to learn the hard way. (Source: VMware Contexa) Today, east-west infiltration by cybercriminal adversaries can quickly turn a relatively minor breach into a damaging data-exfiltration incident or a full-scale ransomware attack. That's why reducing attacker dwell time and curbing lateral movement are essential components to any network security strategy—no matter if you operate on premises, in private clouds or multi-cloud architectures. Join expert Chad Skipper for eye-opening insights and practical strategies to defend your organization against post-breach lateral movement. You’ll leave the session armed with: Research, statistical analysis, and threat reports emphasizing the threat that lateral movement represents Key metrics, strategies, and modern solutions for detecting post-exploitation east-west movement Best practices for an effective response once suspicious activity is detected
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (123)
Subscribers (5557)
VMware is a leading provider of multi-cloud services for all apps, enabling digital innovation with enterprise control. We streamline the journey for your organization to become a digital business that deliver better experiences to your customers and empower employees to do their best work. Our software spans App Modernization, Cloud, Networking & Security and Digital Workspace. In this channel, you will find resources to help you build, run, manage and secure your apps across clouds. Visit us at https://www.vmware.com/ to find out more.