Date: Tuesday, October 12th at 11am PST / 2pm EST
Detecting an in-progress cyberattack is an essential component of any security strategy. But it's getting increasingly harder to spot malicious attackers who gain access to information systems through gaps in the identity system, then move stealthily through the environment—often undetected for weeks or months—before dropping malware. To detect identity system attacks, many companies rely on DC event log consolidation and SIEM solutions. But some attack techniques leave no evidence of malicious activity.
In this session, Tal Sarid will walk through some attack techniques that bypass traditional monitoring solutions.
You’ll come away with guidelines for guarding against cyberattacks that leave no trace:
About the presenter: