Share Your Content with Us
on TradePub.com for readers like you. LEARN MORE
Network Threats: A Step-by-step Attack Demo

Request Your Free On-Demand Webinar Now:

"Network Threats: A Step-by-step Attack Demo"

Unveiling What Happens Between Breach and Impact

When discussing cyberattacks, the focus often lies on how threat actors gain entry and the eventual damage caused. But the critical events that occur between these two points—on the network—are often overlooked.

With average dwell times exceeding six months, what do threat actors do during this period to evade detection, maintain persistence, and advance their attack?

Join Cato’s Security Experts—Dolev Attiya, Staff Security Engineer; Matan Mittelman, Security Research Team Leader; and Etay Maor, Senior Director of Security Strategy—as they uncover the tools, tactics, and techniques threat actors employ during a breach. Using the MITRE ATT&CK framework, they’ll dissect each stage of the attack lifecycle, providing a detailed look at:

  • Living on the Land (LOL) attacks, network discovery, and lateral movement
  • Techniques for persistence, credential dumping, and evading detection
  • The motivations behind threat actor actions and their reliance on prior and future steps
  • Strategies for defenders to detect, mitigate, and prevent network-based threats

Don’t miss this opportunity to witness an attack unfold and learn how to take a proactive, holistic approach to defense.


Offered Free by: Cato Networks
See All Resources from: Cato Networks

Recommended for Professionals Like You: