Why Model and Detect Late Stage Attacks

Play Why Model and Detect Late Stage Attacks
Sign in to queue

Description

Think of an attack path (or kill chain) as one of those kids toys where you rotate animals. Heads, bodies, tails. Intrusions, compromises, exfiltrations. Which part is easiest to detect and why?

Tag:

Security

Embed

Download

Download this episode

The Discussion

Add Your 2 Cents