How to defend against multi-stage attack campaigns
Join this live attack simulation to understand how to defend against attackers and break the kill chain
Learn how you can stop attackers with a behavioural approach to detection
We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch On-Demand
Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise.
During this webinar we will discuss how this happens and what we can do to stop it. In this attack simulation, you will get an inside look at how multi-stage attack campaigns operate today.
The simulation will demonstrate the attacker’s infiltration and show the malicious operation as it moves across the entire environment. You will also see the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before business-critical assets are compromised.
In this webinar you will learn why a behavioural approach to detection is essential to stopping sunburts, ransomware and broader malicious operations.
Join this webinar to learn:
- How defenders can gain the upper hand against today’s attack campaigns
- What the attacker’s mindset is and how it impacts your strategy as a defender
- How to start preventing attacks and automating threat detection
Speakers
Angeline Tan is focused on supporting large enterprises and the public sector with complex architectures and selling cycles. Tan brings over two decades of solution selling and enterprise software sales experience in the area of cyber security, cloud, middleware, business intelligence, mobile platform for technology like FireEye, Recorded Future, IBM, Dell, Microsoft and SAP.
EngHoa Tan has over 10 years of cyber security experience as well as expertise in the design and architecture of infrastructure security. He has been involved in incident response cases on APT attacks and has a wide understanding of cyber-crime and building preventive measures framework.
Sponsor
We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Watch On-Demand