Pivot and Pillage: Detecting Lateral Movement - South by Southeast Asia SANS@Mic

  • Webcast Aired Wednesday, 04 Nov 2020 8:30AM EST (04 Nov 2020 13:30 UTC)
  • Speaker: Steve Anson

Whether performed by an insider threat, or by an external threat that's managed to get a foothold inside, the next step in the attacker's dance is usually the pivot: moving from one host to another to expand control or pillage a particular resource. In this talk we will look at some of the more commonly encountered pivot techniques to help you understand, detect, and deter malicious, lateral movement within your network.