Storming the Breach, Part 2: Uncovering Attacker Tracks

WATCH THIS ON-DEMAND WEBCAST TODAY!

As a follow up to "Storming the breach part 1: Initial Infection Vector", Mike Scutt and Wade Woolwine, experts on the incident response team at Rapid7 got together again to discuss the evidence sources use to discover what activities attackers have performed after an initial breach. Mike and Wade will:

  • Walk you through methods for discovering lateral movement, tool use, and credential theft
  • Discuss the evidence sources use to timeline attacker activity
  • Include an overview of the tools used by Rapid7's IR team to gather, parse, and present attacker activity

Speakers: Mike Scutt, Senior Consultant for Analytic Response, Strategic Services, Rapid7 | Wade Woolwine, Manager of Strategic Services, Rapid7

Fill out the form to watch the webcast