Cyber Attack Trend: Misuse of Native IT Tools and Living Off the Land Attacks

Are bad actors on your network going unnoticed—simply by utilizing native tools?
This on-demand webinar explores how native tools within your security environment can be harnessed by threat actors—bypassing and infiltrating your organization’s security defenses. (Are they in there now?)
We discuss why understanding your security environment is critical to your organization’s cyber resiliency, current states of vulnerability, and the probability of exploitation and compromise.

Give your team the added edge of proactivity and productivity – so you’ll be ready to bounce back if (or when) a breach happens.
You’ll learn:

  • How threat actors can perform malicious activities—unnoticed by modern security tools
  • How to utilize IR services for threat hunting and baselining to identify malicious activity
  • What a good security posture really looks like

Watch Now! →

Netwitness

Speakers

Meet The Speakers

Scott Lashua

CISSP, GPEN, DC3 Forensics Examiner

NetWitness Incident Response Practice Manager – Americas
Scott has more than 25 years of experience in the information security industry. He previously served as vice president of cyber threat hunting and incident response at State Street, the security operations center manager at Cybereason, and as a senior practice consultant at RSA Security. Scott’s fluent in reverse malware engineering, penetration testing, and vigilant threat hunting, and helps companies get to where they need to be for better, faster, stronger security operations.

Accelerate Your Threat Detection and Response Today!