Webinar: Understanding Malware Lateral Spread Used in High Value Attacks

On Thursday, January 28 at 9 a.m. PST, a webinar will tackle one of the most precarious issues of the digital age — the nefarious spread of malware. …

1262
1262
Webinar Understanding Malware Lateral Spread Used in High Value Attacks

Webinar Understanding Malware Lateral Spread Used in High Value AttacksOn Thursday, January 28 at 9 a.m. PST, a webinar will tackle one of the most precarious issues of the digital age — the nefarious spread of malware.

The webinar will be presented by Nick Bilogorskiy of Cyphort Labs.

“APTs are known to use advanced Techniques, Tactics, and Procedures (TTP), including advanced malware design with protection layers, sandboxing evasion, and lateral movement inside penetrated networks to seek out high value targets,” a statement emailed to MMW reads.

In this webinar, Nick Bilogorskiy of Cyphort Labs will:

  • Review various lateral movement techniques and methods used by past advanced threats
  • Look at APT samples, like Shamoon, in detail to show the specific steps in the lateral movement by the malware
  • Provide an understanding of how lateral movement of APT should help security defenders to better select and implement protection solutions

To learn more or to register, click here.

In this article