How Attackers Move through the Network Undetected

Register to watch full recorded webinar for free
{{ firstError }}
We care about security of your data.
Privacy Policy
About the Webinar

Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

By the end of this session, you will know:

  • What techniques attackers use to traverse the network without raising alarms
  • What native Microsoft tools can help you spot covert attacks
  • How you can identify the hiding attacks by using Netwrix Auditor functionality
Speakers
Liam Cleary avatar
Liam Cleary,
Microsoft MVP and MCT
Kennet Johansen  avatar
Kennet Johansen ,
Manager Solutions Engineering EMEA & APAC