Inside You’ll Find
18 lateral movement techniques used by our red-team to break into some of the world’s most well-defended networks. You will learn:
- The attacker’s view of each technique. Understand how adversaries use them to move laterally in your network undetected.
- Practical recommendations on how you can prevent attackers from executing these techniques.
- ‘Effort to Exploit’ and ‘Effort to Defend’ ratings for each technique. Use these to prioritize network changes for prevention.
- Easy to implement deception plays for techniques that are hard or impractical to prevent.
Grab Your Copy
Much dreaded form coming up
We hate forms too but this one will help us get to know each other. Promise