On-Demand Webinar

Overstaying Their Welcome: How Hackers Persist in Your Environment

Hackers are lazy—or efficient, depending on how you look at it. Once they’ve compromised your environment, they establish persistence to lurk around—coming and going as they please while they plot their next move.

Persistence has quickly become a staple in the modern attacker’s playbook. And while it gives attackers an ability to maintain access to compromised systems, it’s also an opportunity for detection.

In this webinar, we’ll put on our hacker hats to learn:

  • Where attackers are hiding in plain sight
  • Common techniques that adversaries and malware use to persist
  • How to detect (and eliminate) persistence mechanisms
  • The keys to a threat-informed defense

Event Speakers

John Hammond
Todd Painter
Tom Lawrence

Now Available On-Demand