Why Model and Detect Late Stage Attacks

Sign in to queue

Description

Think of an attack path (or kill chain) as one of those kids toys where you rotate animals. Heads, bodies, tails. Intrusions, compromises, exfiltrations. Which part is easiest to detect and why?

Tag:

Security

Embed

Download

Download this episode

The Discussion

Add Your 2 Cents