Bootcamp Series Part 2: Disrupting the Attacker’s Toolkit - During the Attack

Logo
Presented by

Joseph Salazar, Technical Deception Engineer, CISSP, CEH, EnCE

About this talk

Attackers are increasingly targeting enterprise identities to impersonate users, allowing them to evade defenses, elevate privileges, acquire targets, and compromise them. Watch this boot camp webinar series to understand and learn how to detect an attack early in the process, derail and misdirect an attacker’s next move, and gather forensic information for a stronger defense. Part 2 – Disrupting the Attacker’s Toolkit – Detect, Hide and Deny, Engage • Derail Attacks – Detect and Respond See how deception and concealment technologies misinform and misdirect attacks with decoy objects and credentials, derailing their activities while providing early warning. • Engage Attackers – Gather Threat Intelligence Learn how full OS decoys engage attackers and record their activities, capturing forensic data to create threat intelligence and strengthen defenses.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (30)
Subscribers (5354)
Attivo Networks closes the cyber security detection deficit with dynamic deception that accurately and efficiently reveals in-network threats and their lateral movement.