

Episode 107: How To Defend Against Lateral Movement
Sep 11, 2024
This discussion dives deep into the world of lateral movement in cybersecurity, highlighting how attackers exploit techniques like RDP and PowerShell Remoting to navigate networks undetected. It emphasizes the critical risks organizations face due to endpoint vulnerabilities and over-reliance on EDR systems. Credential gathering tactics, including password spraying, reveal the dangers of poor management. The speakers outline robust strategies such as network segmentation and least privilege access to strengthen defenses and monitor for suspicious activity.
Chapters
Transcript
Episode notes
1 2 3 4 5 6
Intro
00:00 • 3min
Lateral Movement in Cyber Attacks
02:33 • 12min
Understanding Lateral Movement in Cybersecurity
14:29 • 7min
Exploring Credential Gathering Tactics and Vulnerabilities
21:10 • 2min
Securing Internal Networks
23:04 • 11min
Identifying Vulnerabilities: Tools and Strategies for Lateral Movement Prevention
34:30 • 3min