Every organization gets compromised – it’s how fast you detect and respond to an incident that counts. This is especially important when you look at trends like the overnight move to remote work, the rise in encrypted traffic and acceleration of cloud adoption, as well as the proliferation of enterprise IoT that have expanded the attack surface and complicated the job of security professionals. We’ll explore those trends and the opportunity that lay ahead for security teams post-compromise to prevent an event that results in an outage or an incident from becoming a full-scale data breach.
- In an industry so focused on prevention and protection, this presentation urges organizations to pay attention to the post-compromise activity that is happening after attackers have successfully evaded your defenses in order to prevent full-scale breaches
- Define post-compromise activity and examine its prevalence
- How to expose and respond to post-compromise threat activity hiding in the east-west corridor