- 14 Nov
In modern enterprise networks, compromising a single host does not provide much to an adversary all by itself. Thus, sophisticated cyber attack campaign almost always includes lateral movement techniques as they open up whole new possibilities for adversaries. However, advanced attackers often carefully plan and execute their lateral movements to avoid being detected.
In this session, I will talk about how adversaries such as APT groups perform targeted and objective-oriented lateral movement attacks while staying hidden and persistent in a compromised network and what organizations can do to defend themselves against such attacks.