Cybersecurity
,
Data Breach
,
Governance
Network Intruders Exploit Your Vulnerabilities - Defend Yours. Attack Theirs.
Presented by
CA Technologies
60 minutes
Disrupting the Cyber Kill Chain by Choking the Attack Where it is Most Vulnerable
API's, Server Integrity and Identities
Our adversaries follow a fairly well defined process of gaining access, establishing residency and exploiting our networks. If we understand how they act during each of these phases then we can make huge strides in curtailing their malicious endeavors. This session examines some best practices for defeating each phase of the attack:
Getting In With the growing deployment of inter application communications, attacks such as those at SnapChat, Yahoo and Tesla are increasingly leveraging insecure API's as entry points into networks. This webinar will examine why API protection must be implemented to minimize these vulnerabilities.
Staying In - Malicious code is very vulnerable while it is being installed and as it attempts to become resident. We'll explain how continuously refreshing the integrity of servers prevents malware from establishing a foothold.
Acting - If you have the keys to every door in a house, there is no need to hack through each door individually. Since one of the primary targets for attackers are credentials, they go after those with extensive privileges to a broad array of resources within your infrastructure in order to expedite their penetration. We'll see how to implement fine grained access control by granting authorization and access to resources only to those individuals that need it, decreasing the vulnerability of more users.
The "Cyber Kill Chain," adapted by Information Security Media Group experts from the military "Kill Chain" concept, has been demonstrated thoroughly over the past several years. Some of the most famous retail breaches, including the more recent OPM breach, are examples of successfully executed cyber kill chains.
Threat actors rely on their ability to:
Gain access to the network;
Remain on the network without being identified in a timely fashion;
Take action on the network.
While some see these as opportunities to exploit, they are also opportunities to shut-down and eliminate and attack.
Hear from industry experts on how to:
Keep the bad actors out of your network;
Keep the threat from staying in the network; shut down any breach by cycling systems;
Keep threat actors who have made it into the network from taking any action.
You might also be interested in …
Fighting for Jurisdiction Post-Breach