On demand Webinar

Defending Against Insider Threats and Compromised Assets

Even as organizations continue to transition to a Zero Trust architecture, they remain vulnerable to identity-based threats, malicious insiders, and lateral movement. Security teams need a proactive approach to stopping these advanced threats.

Watch this on-demand webinar for an hour of learning as cybersecurity experts discuss how you can extend zero trust with deception. It covers:

  • What deception is and why it’s effective
  • How deception fits into a zero trust architecture
  • How we address MITRE ATT&CK
  • How deception detects compromised users, lateral movement, and defense evasion techniques like EDR bypass
  • A demo of how deception detects and disrupts the attack at different stages
Speakers:

Sam Curry
VP, CISO
Zscaler

Maggie MacAlpine
Cyber Engagement Lead for the Center for Threat Informed Defense
MITRE Enguinity

Watch Now