During an intrusion, adversaries will need to expand their access beyond the initial victim and control different systems within the target network to achieve their goal. This set of techniques that allow remote code execution are known as Lateral Movement.

In this tech talk, we will cover the most common Lateral Movement techniques affecting Microsoft environments and how to detect this behavior using Splunk.

Tune in to this webinar to learn about:

  • Most common ways adversaries move laterally in Windows environments
  • Detection opportunities defenders have to detect these techniques

Mauricio Velazco
Principal Threat Research Engineer