Think Like an Attacker: What You Must Know About Targeted Attack Techniques

  • Webcast Aired Tuesday, 17 Nov 2015 3:00PM EST (17 Nov 2015 20:00 UTC)
  • Speaker: John Pescatore

It's clear that even the best-protected network will be compromised, leading security professionals to focus more attention on how to find an attacker once they have broken through their defenses. It's also clear that these attackers can generally go about their business while being completely invisible to your security or IT team. This webinar will reveal many of the operational techniques of a hidden attacker to which most companies are blind. John Pescatore, director of SANS Institute, will describe the move from a prevention-only strategy to one with detection based on behavioral profiling from both network and endpoint visibility. The webinar includes a live demonstration of a new Cyber Attack Training System (CATS), including a simulated external attack. We will also unveil the results of the Hacker Simulation Challenge, where participants used the CATS environment to break into a network to locate and exfiltrate a target data set.

Attend the webinar and learn practical insight and detail on:

  • How intruders move from a single compromised host or account to multiple points of control and full access to data and other resources completely undetected
  • How attackers can be pinpointed through their operational activities
  • How to detect only malicious anomalies
  • How to spot risky or improper internal behavior or the workings of a malicious insider