The only thing we know for sure about the next big cyberattack is that it will involve two hosts and a network. Every attacker must use the network, which makes it an ideal instrumentation point for detecting attack activity. Organizations deploy IDS solutions for traffic entering and leaving the environment (north-south) but do not have robust network detection capabilities for their internal (east-west) traffic. This webinar will discuss how organizations can use the network to detect stealthy post-compromise activity that evades other monitoring techniques.