Many people are aware of Internet Control Message Protocol (ICMP) or at least some common tools that use ICMP, like Ping. ICMP is used to report errors but can be used for so much more. Were you aware that ICMP can be used for covert tunnels, exfiltrating data, and may be leaking information about your internal systems? Are you monitoring ICMP?
Join us for this webcast where we will dive into ICMP, look at expected and unexpected types of ICMP messages, and ways of monitoring ICMP to better defend our networks.