Preventing Credential-based Attacks
Defending against cyberattacks is a tough business, especially when attackers pose as authenticated users on your network. Ask Our Cybersecurity Experts How You Can Prevent Phishing and the Abuse of Stolen Credentials Join us for an "Ask the Expert" session with our cybersecurity team to learn best practices and get your questions answered. In addition to focusing on real-life examples from Unit 42, we will demonstrate what you can do today to stop credential theft and abuse in the highly targeted healthcare industry. In this session we will: Present new threat research from Unit 42 on credential-based attacks and phishing Identify trends and techniques in methods used for credential theft and abuse Present the unique attack lifecycle used in credential-based attacks Evaluate best practices in light of the modern risk profile Discuss techniques to stop credential leakage Interactive Roundtable Moderated by: SSA John Caruthers, FBI San Diego SSA Caruthers has been with the FBI since 1992 and is currently serving as Supervisory Special Agent of the San Diego Division's National Security Cyber Squad. Bryan Lee, Unit 42 Threat Intelligence Researcher at Palo Alto Networks Bryan's areas of expertise are in cyber espionage threats, cyber security operations, and threat collection. Prior to joining Palo Alto Networks, Bryan worked at the NASA Security Operations Center where he led the real-time detection team. The Unit 42 team gathers, researches, analyzes, and provides insights into the latest cyber threats, then shares them with Palo Alto Networks customers, partners and the broader community to better protect computing environments.