
 The Cyber Threat Perspective
 The Cyber Threat Perspective Episode 107: How To Defend Against Lateral Movement
 Sep 11, 2024 
 This discussion dives deep into the world of lateral movement in cybersecurity, highlighting how attackers exploit techniques like RDP and PowerShell Remoting to navigate networks undetected. It emphasizes the critical risks organizations face due to endpoint vulnerabilities and over-reliance on EDR systems. Credential gathering tactics, including password spraying, reveal the dangers of poor management. The speakers outline robust strategies such as network segmentation and least privilege access to strengthen defenses and monitor for suspicious activity. 
 Chapters 
 Transcript 
 Episode notes 
 1  2  3  4  5  6 
 Intro 
 00:00 • 3min 
 Lateral Movement in Cyber Attacks 
 02:33 • 12min 
 Understanding Lateral Movement in Cybersecurity 
 14:29 • 7min 
 Exploring Credential Gathering Tactics and Vulnerabilities 
 21:10 • 2min 
 Securing Internal Networks 
 23:04 • 11min 
 Identifying Vulnerabilities: Tools and Strategies for Lateral Movement Prevention 
 34:30 • 3min 
