Overview of Detecting and Preventing Lateral Movement 

80% of all breaches involve identity-based attacks with lateral movement based on compromised credentials. Lateral movement is a common technique in scenarios from ransomware to supply chain attacks. We will show how deterministic and behavioral detection techniques can identify lateral movement to enable zero trust security in real-time, with fewer false positives, and a better user experience.