The latest snapshot of your network traffic logs may look innocent enough, but hidden amongst your daily activity are the movements of a cybercriminal adversary who has secretly breached your systems and is now trying to expand its foothold within your virtual walls in multi-cloud environments.
It's this east-west infiltration that turns what could be just a relatively minor breach into a damaging data exfiltration incident or a full-scale ransomware attack. That's why reducing attacker dwell time and curbing lateral movement are essential components to any network security strategy, whether you operate largely on premises, in private clouds or multi-cloud architectures.
This informative webcast will offer key insights and strategies related to the defense against post-breach lateral movement. The session will include:
• Research, statistical analysis and threat reports that underscore the threat that lateral movement represents
• Key metrics, strategies and solutions for detecting post-exploitation east-west movement, including behavioral analysis and identifying threat signatures
• Best practices for effective response once suspicious activity is detected
Global Security Technologist
Chad Skipper serves as Global Security Technologist in the Network and Security Business Unit at VMware. With more than 25 years in Information Security, Chad has served in many executive security technologist and strategist roles of endpoint, network, cloud, and hosted security services at Lastline, acquired by VMware, Cylance, acquired by Blackberry, Dell, Cisco, Symantec and is a USAF veteran.
VP, Content Strategy
Bill Brenner is VP of Content Strategy at CyberRisk Alliance -- an InfoSec content strategist, researcher, director, tech writer, blogger and community builder. He was formerly director of research at IANS, senior writer/content strategist at Sophos, senior tech writer for Akamai Technology's Security Intelligence Research Team (Akamai SIRT), managing editor for CSOonline.com and senior writer for SearchSecurity.com.