Playing Network Traffic Cop: Detecting & Restricting Lateral Movement in Multi-Cloud Environments
If you can’t see it, you can’t protect it. Considering 44% of breaches perform some sort of lateral movement, that’s a lesson you don’t want to learn the hard way. (Source: VMware Contexa)
Today, east-west infiltration by cybercriminal adversaries can quickly turn a relatively minor breach into a damaging data-exfiltration incident or a full-scale ransomware attack. That's why reducing attacker dwell time and curbing lateral movement are essential components to any network security strategy—no matter if you operate on premises, in private clouds or multi-cloud architectures.
Join expert Chad Skipper for eye-opening insights and practical strategies to defend your organization against post-breach lateral movement. You’ll leave the session armed with:
- Research, statistical analysis, and threat reports emphasizing the threat that lateral movement represents
- Key metrics, strategies, and modern solutions for detecting post-exploitation east-west movement
- Best practices for an effective response once suspicious activity is detected
Note: If you can’t join us for the live event, please feel free to register and we’ll send you a link to the webcast recording so you can watch on-demand.