Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Watch this 52-minute conference talk from NDC Security where Avishay Zawoznik demonstrates a "run-of-the-mill" simulation of a full network breach, showing how everyday cyberattacks occur using well-known techniques rather than sophisticated tools. Learn how cognitive biases in cybersecurity lead us to focus on sensational hacking campaigns while overlooking common attack methods responsible for most network breaches and ransomware attacks. Follow along as the speaker walks through each stage of an attack—from initial access to discovery, lateral movement, and data exfiltration—based on public DFIR reports, MITRE's ATT&CK framework, and common hacking tradecraft. Discover the importance of defense-in-depth strategies and how placing multiple different tripwires throughout your systems can effectively stop network breaches, with special emphasis on the crucial role of network controls and detection mechanisms.