How Financial Companies Can Starve Attackers Who Live off the Land

  • Date 04 Jun 2019

How Financial Companies Can Starve Attackers Who Live off the Land

04 Jun 2019, 14:30 - 15:15

Insight Stage
Language:
English

Securing Finance

Cyberattackers and malicious insiders increasingly rely on living-off-the-land techniques. Leveraging native connectivity to move through the network reduces their risk of detection. Financial organisations have long been targets of these attacks—yet the problem remains unsolved. This is partly because there is an ever-changing inventory of credentials and connections hidden in the environment that enable lateral movement and network persistence. Automated credential harvesting and mapping tools make their job easier. Can you see what attackers can see once they’ve established a beachhead?  Can you strip out excess, high-risk conditions? This session will examine lateral movement methods and how to eliminate the fuel that enables it.

Learning Outcomes:

  1. Examine the problem of lateral movement in a new way
  2. See how interrupting the human decision-making process can alleviate the need to match IoCs
  3. Gain new insight on prevention for early stages of the cyber killchain
  4. Consider ways that core functions such as AD management, PAM and vulnerability management can be augmented
  5. See how lateral movement hygiene can also improve attack detection

 

Contributors

  • Ofer Israeli

    Speaker

    CEO & Founder

    Illusive Networks

    Ofer Israeli is the founder and CEO of Illusive Networks. His understanding of the advanced attack process played a pivotal role in shaping...

Business Issues covered

  1. What will this session help you to do?
    • Mitigate the effects of new vulnerabilities and exploits‎
    • Understand internal and external threats and keep a business secure‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

Sponsors

Illusive Networks

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.