Inside the Threat: Secureworks CTU Analysis | Episode 3
Access On-Demand Webinar
Speakers:
Rafe Pilling, Director of Threat Intelligence, CTU Threat Research
Date Recorded: August 27, 2024
Duration: 30 minutes
Join Secureworks® CTU™ experts for an in-depth exploration of "Understanding Adversary in the Middle (AitM) Tactics and Credential Theft," a crucial topic for anyone concerned with protecting remote access solutions or SaaS applications. This webinar will unravel the complexities of AitM attacks, a sophisticated method used by threat actors to intercept and steal user credentials or tokens.
We will delve into the mechanics of these attacks, highlight real-world examples, and examine the tools and technologies employed by attackers. Additionally, we'll discuss effective strategies for detection, prevention, and response, providing practical advice to safeguard your organization. Don't miss this opportunity to enhance your understanding and fortify your defenses against one of the most insidious threats in the digital landscape.
In this informational webinar, you will:
- Gain insights into what AitM attacks are and why you need to watch out for these type of attacks
- Discover the various types of AitM attacks and how they work
- Learn how to protect your organization from AitM attacks