Threat hunting in the real world and how attackers avoid endpoints | SASIG
Forgotten your password?

Wednesday 10 March 2021, 11am-12noon (GMT)

This is a double webinar – two presentations in one session.

4 ways attackers sidestep your endpoints

Cybercriminals constantly evolve their tactics to avoid detection.

As cyberattacks become more sophisticated and difficult to detect, it’s more important than ever for defenders to understand how they work in order to protect against them. In this session, you’ll see how attackers avoid your endpoints and how to detect signs of an attack, even without your EDR firing.

Join us as we demonstrate real-life attacks where attackers avoid the endpoint – like creating malicious Microsoft 365 apps or exploiting vulnerable remote access gateways.

Dr William Priestley, Enterprise SE Manager at Varonis, explains how these attacks work and provides strategies to defend against them.

You’ll learn:

  • How to create a malicious Office macro
  • How attackers exploit remote access gateways
  • How a supply chain attack, like SolarWinds, works
  • What to look for as a sign of compromise

 

Just how practical is threat hunting in the real world?

Also join Head of Threat Intelligence Nahim as he discusses how to create a threat hunting programme.

He looks at the key processes you need to have in place to make sure your programme is successful and what challenges you will face.

 

Facilitated by

Martin Smith MBE (info), Chairman & Founder, The SASIG

 

Presented by

Dr William Priestley, Enterprise SE Manager, Varonis
Keith McDevitt, Cyber Resilience Integrator, Scottish Government
Nahim Fazal (info), Head Of Threat Intelligence, CounterCraft

Log in to watch the webinar on demand


Log in here
This website uses cookies, by continuing to use the site you agree to using cookies. Continue