Visit https://securityweekly.com/attivonetworks for more information!
Attackers have repeatedly demonstrated that they can evade perimeter defenses to compromise a system inside the network. Once they get in, they must break out from that beachhead, conduct discovery, credential theft, lateral movement, privilege escalation, and data collection activities. Suppose they go looking for locally stored files or network shares and instead see nothing of value? What if they query Active Directory and don’t get real credentials in the responses? What if they look for ports or services to attack, and instead, their connections get redirected to systems with no value? If they can’t see and access data or accounts that move them forward, they can’t attack anything of value. Learn how deception and concealment technology can deny, detect, and disrupt attackers when they first enter the network.
This segment is sponsored by Attivo Networks.
Disrupt Attacks at the Endpoint with Attivo Networks
Calculating ROI for Attivo Deception and Concealment Technology: https://attivonetworks.com/documentation/Attivo_Networks-Calculating_ROI_for_Deception_Concelament.pdf
Using a Commercial Deception Solution to Improve MITRE ATT&CK Test Results for Endpoint Security: https://go.attivonetworks.com/Improving-MITRE-test-results-endpoint-security.html
Attivo Networks MITRE Shield Mapping: https://go.attivonetworks.com/WC-MITRE-Shield-Mapping-whitepaper.html
Security Weekly, in partnership with CyberRisk Alliance, is excited to present Security Weekly Unlocked on December 10, 2020. This 1 day virtual event wraps up with the 15th anniversary edition of Paul’s Security Weekly live on Youtube! Visit https://securityweekly.com/unlocked to view the agenda and register for free!