The SolarWinds breach startled practitioners with the skill-full ways it avoided detection. We will explore how cyber deception might have detected the breach activity during the lateral movement phase of the attack.
Join a panel from Mitre Engage and the ACDA as we look at how cyber deception and adversary engagement techniques work during the before, during and after phases of a cyber incident. We'll use real life case studies as examples. Zoom Link. https://us06web.zoom.us/j/85765870789?pwd=R3ZtZ0ZFQVc0NHRLYWxXVmpKckQwQT09