We often hear about the two ends of an attack lifecycle – how threat actors gain entry and the resulting impact. But what happens in between? Much of an attack occurs between these two events – on the network.
With average dwell times exceeding six months until detection, what actions do threat actors take during this period to evade discovery, ensure persistence, and maintain awareness of their location on the network?
Join Cato’s Security Experts: Dolev Attiya, Staff Security Engineer; Matan Mittelman, Security Research Team Leader; and Etay Maor, Senior Director Security Strategy, as they explore the actions of threat actors on networks. They'll demonstrate the tools, tactics, and techniques used during a breach. Using MITRE ATT&CK as a guideline, the Cato team illustrates each step in detail.
From Living on the Land (LOL) attacks and network discovery. to lateral movement, persistence, credential dumping, and more – witness an attack unfold!
Register now to discover:
The various methods threat actors employ to breach a network
Insights into the motivations behind these actions and their reliance on previous and future steps of the breach
Effective strategies for defenders to detect, mitigate, and prevent these threats, emphasizing the importance of a holistic view of the attack lifecycle