Training

Uncover the Evidence of Compromise From Your Endpoints?
Uncover the Evidence of Compromise From Your Endpoints?

English

With an estimated 80% of today's malicious code employing anti-detection and anti-analysis mechanisms, security teams are in an intractable arms race. Attackers build or buy evasive malware to extend dwell time and accomplish their cyber objectives. In response, security teams roll out next-gen technologies and adapt their investigative methods to catch up. Despite executive teams' hyper-focus and increased spending on incident response capabilities, a critical and overlooked success factor in many incident investigations is the analyst' depth of knowledge of host-based trace artifact identification and analysis. Analysts need to know where to look for attacker presence and activity when the most obvious artifacts are gone.

In this session, we discuss:

  • How to gain actionable insight into trace endpoint artifacts that reveal threat actors' lateral movement and evasion techniques;
  • Key endpoint indicators of compromise, which increase the fidelity of your threat hunting strategies;
  • How to prepare a training plan for upping the skills of your incident response team to detect and analyze critical tells of adversary.

Português

Com cerca de 80% do código malicioso de hoje, que emprega mecanismos de detecção e anti-análise, as equipes de segurança estão em uma corrida armamentista intratável. Os invasores criam ou compram malware evasivo para estender o tempo de permanência e realizar seus objetivos cibernéticos. Em resposta, as equipes de segurança implantam tecnologias de última geração e adaptam seus métodos de investigação para recuperar o atraso. Apesar do hiper-foco das equipes executivas e do aumento dos gastos com recursos de resposta a incidentes, um fator de sucesso crítico e negligenciado em muitas investigações de incidentes é o profundo conhecimento do analista da identificação e análise de artefatos de rastreamento baseados em host. Os analistas precisam saber onde procurar a presença e a atividade do invasor quando os artefatos mais óbvios desaparecerem.

objetivos de aprendizado

  • Obtenha informações acionáveis

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.