CISOs have rightfully assumed a worldview which includes assuming that a determined and well-resourced attacker will gain access to their systems. With this worldview as their guide, investments focus on preventative controls and fast detection and response capabilities. Holding the opposed ideas of assuming compromise while protecting the organization has mostly served us well, in developing strong protection controls and reducing attacker dwell time. There is still an opportunity to close a significant gap in data exfiltration using a variety of the controls and solutions already in place.
Chief Innovation Officer and data security expert Gabriel Gumbs explores exfiltration activities in the wild and in action, the current approaches to detecting exfiltration and how these practices, while good, fall short of the goal of detecting and preventing exfiltration in an assumed compromised state.
Learn how to adopt existing technologies to better focus on the exfiltration activities that allow attackers to maintain a near 100% success rate of smuggling data out of an organization. Gabe will share emerging methodologies and examples currently in use by global organizations.
- Trends in data exfiltration
- Challenges of data exfiltration in the cloud
- Administrative and technical controls for combating data exfiltration
Technical Level: Medium