STEALTHbits Technologies, Inc © 2019
Identify Threats. Secure Data. Reduce Risk.

Lateral Movement Techniques and How to Detect Them


Lateral movement techniques are leveraged by attackers to move throughout a network, slowly increasing privileges until they achieve their end goal. Pass-the-Hash, Pass-the-Ticket, and Overpass-the-Hash are three of the most common lateral movement methods performed on Windows systems.  

In this webinar, General Manager of Products, Jeff Warren will take a deep dive into these attack methods. Tune in to learn:  

  • What to look for and how to understand Active Directory lateral movement attacks
  • Practical approaches on how to detect them
Register now!
LinkedIn
Twitter
YouTube
STEALTHbits Technologies

Register Now

Date: Thursday, February 28th
Time: 11:00 AM EDT
Duration: 45 minutes

Presenter:

STEALTHbits Technologies

Live Webinar

Jeff Warren
General Manager, Products
STEALTHbits Technologies, Inc.