0 Results Found
            Back To Results

              The PowerShell Risk

              Understanding and Avoiding PowerShell Attacks

              The PowerShell Risk
              Speaker: Lee Lawson, Special Operation Resercher, SecureWorks Counter Threat Unit
              Available : Live online
              Duration: 2:00 PM - 3:00 PM EDT

              In a recent SecureWorks engagement, 98.5% of the 3,477 commands executed by threat actors were native to the Windows operating system.

              PowerShell is a popular tool that Microsoft has been including with the Windows OS since 2009, but malicious PowerShell use is rivaling ransomware in popularity with threat actors. Security products focused on preventing endpoint threats are often not enough to differentiate legitimate from malicious PowerShell use. Join us for a discussion of why PowerShell is so risky, how SecureWorks researchers identify PowerShell threats, and how you can defend your organization.

              SecureWorks Counter Threat Unit - Special Operations Researcher, Lee Lawson, will discuss how security leaders and practitioners can leverage his experience to reduce the risk and understand how to defend against PowerShell threats in your organizations.

              You Will Learn:

            • What PowerShell is and how it is used in “living off the land” attacks
            • Why built-in tools like PowerShell are so attractive to threat actors
            • Examples of malicious PowerShell use
            • How to defend your organization against common methods to evade prevention and detection
            • Register Here

              Related Content