Security Intelligence Podcast

Lateral Movement: Combating High-Risk, Low-Noise Threats

Play
Play
Share!

Share this Podcast

MyCast

MyCast

MyCast Subscription

Security Intelligence Podcast

IBM Security

Description: Welcome to the Security Intelligence Podcast, whe…

Most Recent Post

Lateral Movement: Combating High-Risk, Low-Noise Threats

Play Download media
"What I like to tell people is that when you have one computer that's infected, that's annoying," says Charles DeBeck, a member of IBM Security's Threat Intelligence Production team. "When you have 1,000 computers that's infected, that's a problem." Lateral movement is one way threat actors escalate annoyances into problems. "Lateral movement consists of a series of techniques that enable an adversary to access and control remote systems in a network," Joey Victorino, a consultant for IBM X-Force IRIS, explains. In some cases, all it takes is four seconds for an adversary to pivot across a network. Charles and Joey join Pam to discuss the implications of lateral movement becoming more automated for threat actors; the potential business impact of lateral movement; how to limit the success of a threat actor in an environment; and how security precautions such as multifactor authentication (MFA) can mitigate the impact of lateral movement. For more security stories, visit SecurityIntelligence.com or follow IBM Security on Twitter and LinkedIn.

Last 5 Posts

Travel Security: Why Data Safety Doesn't Get a Day Off

Play Download media
Sunscreen? Check. Boarding pass? Got it. The resolve not to connect to the airport WiFi? Getting there.  

This summer, add cyber hygiene best practices to your travel checklist. Caleb Barlow, Vice President of X-Force Threat Intelligence for IBM Security, shares insights on travel and transportati...

Lessons from a Gray Beard: Transitioning from the Military to Cybersecurity

Play Download media
With thirty years of experience in the military, JC Vega now shares his experiences as a "gray beard" in the role of a cyber range coach. When asked about transitioning from the military to cybersecurity, JC offers advice that applies across fields: consider a path that lets you prioritize quality o...

Foundations for a Winning Operational Technology (OT) Security Strategy

Play Download media
Conversations about operational technology (OT) security have been bubbling up more and more, and justifiably so. The term may not be as well known as it should be " or even entirely settled upon yet " but the consequences of risk in operational technology environments impact our daily lives...

"You Can Never Have Too Much Encryption"

Play Download media
Data encryption can feel like the enterprise version of a kid's least favorite chore: cleaning their room. "One of the biggest challenges," says Stephanie Balaouras, "is just the inertia against getting started."...

Automating Cyber Resilience Best Practices with Dr. Larry Ponemon

Play Download media
What does it take to be cyber resilient? In the words of Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, a cyber resilient enterprise is "one that can prevent, detect, contain, and recover from a myriad of serious threats against data applications and IT infrastructure."...

Guest Book

Subscribe & Follow