Catch Me If You Can: Methods for Detection and Investigation of User Based Attacks

Watch this on-demand webcast

Fill out the form below to watch this on-demand webcast

The latest Verizon Data Breach Investigation Report states that the use of stolen credentials has risen to become the most commonly used threat action in data breaches. Now, with the Heartbleed OpenSSL vulnerability, chances are higher than ever that user accounts will be exploited by attackers trying to enter an organization’s network. Just because users are an unpredictable variable in your network doesn’t mean that security, incident detection, and investigation are impossible.

Watch this webcast to learn about:

  • The risk that user credentials can impose on your network
  • The stages and anatomy of user based attacks
  • Methodologies for detection
  • Tools for accelerating investigation and containment of attacks 


Matt Hathaway, Senior Product Manager, Rapid7 and Lital Asher-Dotan, Senior Product Marketing Manager, Rapid7