Stopping the
Horizontal Kill Chain

This paper focuses on identifying and stopping lateral movement as part of the horizontal kill chain – the actions taken by a threat actor to move laterally within your network looking for systems, applications, and data of value that they can either further exploit to continue the movement, or utilize to exfiltrate valuable data.

But with the data breaches taking weeks, months, and even years to be detected, how can you know when an attack is happening, let alone stop one?

Read more about the common thread that exists throughout an attack – a single action that occurs and resides at the epicenter of all kill chain actions – logons.

Stopping the Horizontal Kill Chain

Learn more about

  • The typical links in the Horizontal Kill Chain.
  • Where to most easily detect a potential attack.
  • How can you stop the kill chain.

Download the White Paper

PDF Version - 270 KB