Bad actors continue to target our Linux systems. With a small amount of effort, we can detect their first access to the system and stop them before they move laterally. But how did they get into our systems in the first place? And what are the procedures for a swift detection and response? In this on-demand webinar, Jay Beale, co-founder and CTO of InGuardians, will attack a Linux system, achieve initial access, escalate privilege, and then take the first step to move laterally. He’ll then demonstrate how to detect the attack and automatically respond to it. Tune in to this session and:
- Observe and understand an attack on a Linux system
- Learn to detect the attack with freely available tools
- Learn to leverage automation to block lateral movement and alert your organization
Jay Beale has created several defensive security tools, including Bastille Linux/UNIX and the CIS Linux Scoring Tool, both of which were used widely throughout industry and government. He has served as an invited speaker at many industry and government conferences, a columnist for Information Security Magazine, SecurityPortal and SecurityFocus, and a contributor to nine books, including those in his Open Source Security Series and the “Stealing the Network” series. He has led training classes on Linux Hardening and other topics at Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training. Jay is a co-founder, Chief Operating Officer and CTO of the information security consulting company InGuardians.