Breaking the Kill Chain: How to Protect Against User-based Attacks


According to the latest Verizon Data Breach Investigations Report, user-based attacks are the most common attack vector. Security professionals must find efficient ways to protect against, investigate and respond to these new types to attacks. Through its Metasploit penetration testing solution, Rapid7 has a unique perspective of how attackers break into and infiltrate networks, which is highly valuable in defending against attacks.

In this webinar, participants will learn about:

  • The narrative of a data breach from the point of view of the attacker with a focus on how they target users
  • The “Kill Chain for User-Based Attacks,” which outlines the steps taken by an attacker
  • An approach for detecting user-based attacks by flagging steps in the kill chain
  • Solutions that speed up the investigation and containment of attacks

Speakers: Christian Kirsch, Senior Marketing Manager, Rapid7 Metasploit and Lital Asher-Dotan, Senior Marketing Manager, Rapid7 UserInsight


Fill out the form below to watch this on-demand webcast

Watch this on-demand webcast today