|
This video is part of the appearance, “Kemp Presents at Security Field Day 5“. It was recorded as part of Security Field Day 5 at 11:00-13:00 on March 24, 2021.
Watch on YouTube
Watch on Vimeo
A complex network compromise scenario evolving from initial exploitation through lateral movement, data hoarding and exfiltration over an alternative protocol followed by the final impact through data encryption. Detection of individual indicators of compromise within the network traffic flows as the attack is progressing allows the security operator to respond properly and on time.
Personnel: Pavel Minarik