Preventing Attackers from Navigating Your Enterprise Systems

Over the past few years, cyber attackers have favored exploits in which they steal a legitimate user’s credentials and then navigate enterprise defenses as a trusted end user. This “lateral movement” enables the attacker to quickly gain access to a wide variety of applications and data, and can lead to a major data breach. In this webinar, experts discuss methods for recognizing anomalous and unauthorized behavior among trusted users, and how to prevent those “users” from gaining access to critical information. You’ll also learn how to limit trusted users from accessing systems or gaining privileges that their roles don’t require them to have.

Available:
Wed, Dec 15, 2021 10:00 AM PST / 01:00 PM EST
Duration:
1h 00min

Attend this webinar and you'll:

  • Find out how hackers steal credentials to access corporate networks
  • Learn how to identify anomalous behavior that are hallmark clues of unauthorized access
  • Get insights on how to prevent further damage if a system intrusion occurs
  • Walk away with best practices for privileged access management to keep your environment protected

Featured Speakers

  • Chris Crowley
    Chris Crowley
    Senior Instructor
    SANS Institute

    Christopher Crowley has 20 years of experience managing and securing networks, beginning with his first job as an Ultrix and VMS systems administrator at 15 years old. Today, Crowley is a Senior Instructor at the SANS Institute and the course author for SOC-Class.com: the culmination of his thoughts on effective cybersecurity operations. He works with a variety of organizations across industries providing cybersecurity technical analysis, developing and publishing research, sharing expert security insights at conferences, and chairing security operations events. He has provided training to thousands of students globally. Crowley holds a multitude of cybersecurity industry certifications and provides independent consulting services specializing in effective computer network defense via Montance®, LLC, based in Washington, DC. Montance® provides cybersecurity assessments and framework development services that enable clients to develop new security operations centers (SOC) and improve existing security operations. An independent consulting firm, Montance® provides direct, customized services to organizations large and small in the financial, industrial, energy, medical, and defense industries. His current focus is on integrating within existing security operations to fill short term gaps where needed, define effective strategy after careful study. He blends cultural alignment with cybersecurity expertise to implement tactical programs to mature monitoring capability, pen testing, and overall security operations.

  • Justin Fier
    Justin Fier
    Director of Cyber Intelligence & Analytics
    Darktrace

    Justin is one of the US’s leading cyber intelligence experts, and holds the position of Director for Cyber Intelligence & Analytics at Darktrace. His insights on cyber security and artificial intelligence have been widely reported in leading media outlets, including the Wall Street Journal, CNN, The Washington Post, and VICELAND. With over 10 years’ experience in cyber defense, Justin has supported various elements in the US intelligence community, holding mission-critical security roles with Lockheed Martin, Northrop Grumman Mission Systems and Abraxas. Justin is also a highly-skilled technical specialist, and works with Darktrace’s strategic global customers on threat analysis, defensive cyber operations, protecting IoT, and machine learning.

  • Terry Sweeney
    Terry Sweeney
    Moderator
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World, SearchAWS.com, and Stadium Tech Report.

Sponsored By