Webinar
Pivot and Pillage: Detecting Lateral Movement
Whether performed by an insider threat, or by an external threat that's managed to get a foothold inside, the next step in the attackers dance is usually the pivot: moving from one host to another to expand control or pillage a particular resource. In this talk we will look at some of the more commonly encountered pivot techniques to help you understand, detect, and deter malicious, lateral movement within your network
Key Information
No Map Available