Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise. How does this happen, and what can we do to stop it?
In this special attack simulation, you will get an inside look at how multi-stage attack campaigns operate today. You will witness the attacker’s infiltration and watch the malicious operation as it moves across the entire environment.
See the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before crown jewels are compromised.
In this webinar you will learn why a behavioral approach to detection is essential to stopping SUNBURST, ransomware and broader malicious operations.
Presenter: Juliana Wong, Account Director, Asia, Cybereason
Presenter: EngHao Tan, CISSP, Senior Sales Engineer, APAC, Cybereason
Moderator: Cyril Tan, CISSP, Membership Director, (ISC)² Singapore Chapter