Webinar

Can You Block Lateral Movement In Real Time?

Register Here

Table of Contents

Share this post

Did you know that lateral movement attacks leverage compromised credentials to propagate through the network and gain access to target resources?


In this recorded webinar, we explain these attacks, and the use of compromised credentials in various steps the difference between standard and advanced attacks, and why security solutions often fail to detect and prevent these attacks. Finally, we will explain how Silverfort’s cutting edge identity platform can detect and block these attacks.

Topics covered:

Speakers

Yiftach Keshet, Director Of Product Marketing at Silverfort

Yiftach Keshet leads the Product Marketing at Silverfort. Prior to joining Silverfort he served in various Product Management and Product Marketing roles with cybersecurity market leaders such as Microsoft, Palo Alto Networks and Team8.

Gal Sadeh, Chief Data Scientist at Silverfort

Gal is Chief Data Scientist in Silverfort’s research team. He is responsible for big data analytics and developing AI engines. He joined Silverfort after many years of research and leadership roles at the 8200 elite cyber unit of the Israel Defense Forces. Gal holds a Masters in Mathematics and Computer Science from Tel Aviv University.