Target. Hunt. Disrupt.

How to Hunt for Lateral Movement on Your Network

may-31-webinar-banner-664x247.jpg

Sign up now for this webcast on how to uncover lateral movement and what you need to know to hunt down these active, but hidden attacks before they do real damage.

Once inside your network, most cyber-attacks go sideways. They progressively move deeper into the network, laterally compromising other systems as they search for key assets and data. Would you spot this lateral movement on your enterprise network?

In this training session, we'll review the various techniques attackers use to spread through a network, which data sets you can use to reliably find them, and how data science techniques can be used to help automate the detection of lateral movement.

 

Meet Your Presenters 

Ryan NoletteThreat Hunter and Security Technologist

Ryan is Sqrrl's primary security technologist and expert. He has previously held a variety of roles including threat research, incident response consulting, and every level of security operations. With over a decade in the infosec field, Ryan has been on the product and operations side of companies such as Carbon Black, Crossbeam Systems, SecureWorks and Fidelity. Ryan has been an active speaker and writer on threat hunting and endpoint security.

Adam Fuchs, Co-founder and Chief Technology Officer

As the Chief Technology Officer and co-founder of Sqrrl, Adam Fuchs is responsible for ensuring that Sqrrl is leading the world in Big Data Infrastructure technology. Previously at the National Security Agency, Adam was an innovator and technical director for several database projects, handling some of the world’s largest and most diverse data sets. He is a co-founder of the Apache Accumulo project.

Sign Up Now for this Practical "How-to" Webinar

In this session, you’ll learn:

  • How lateral movement works and why attackers carry it out
  • Which datasets you can use to reliably hunt for it
  • Common indicators that will often signal evidence of lateral movements
  • Data science techniques that can be used to help automate its detection
Wednesday, May 31st at 2pm ET / 11am PT

Share a few contact details to sign up for the upcoming webcast