| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
You’ve done the patch work, you have good perimeter defenses, and even application whitelisting, however, an attacker has found themselves on an end-user machine. For most networks, once an attacker has gained access the game is usually over quickly for the blue team. In this session, I will discuss several techniques used by attackers to find additional credentials and laterally move about and how to prevent them. Implementing these changes will slow down escalation and lateral movement and credential theft to provide an opportunity for detection and subsequent response.
Cameron Moore has been working in IT and Information Security for 16 years. He holds a Bachelor’s Degree in Computer Science from Texas State University and is a Certified Information Systems Security Professional. Cameron is passionate about Red Team/Blue Team exercise and security solutions that provide measureable results and believes an organization’s detection and response capabilities are the most important measure of a security program. He has worked in Education, Banking and Healthcare and is currently the IT & Security Manager for Texas RE.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast