Events > Event Details


Pivot and Pillage: Detecting Lateral Movement

Whether performed by an insider threat, or by an external threat that's managed to get a foothold inside, the next step in the attackers dance is usually the pivot: moving from one host to another to expand control or pillage a particular resource. In this talk we will look at some of the more commonly encountered pivot techniques to help you understand, detect, and deter malicious, lateral movement within your network

Key Information