XM Cyber’s Paul Giorgi on Using Attack Path Management to Simulate Break-In Points
Behind every so-called data breach is a more discrete “series of incidents,” typically involving attackers or insiders first gaining access to system and then escalating privileges and moving laterally before gaining control of Azure Active Directory, dumping databases, unleashing ransomware or getting up to other unwelcome mischief, says Paul Giorgi, director of sales engineering at XM Cyber.
See Also: Fireside Chat | Zero Tolerance: Controlling The Landscape Where You’ll Meet Your Adversaries
Based on research conducted by his firm into both on-premises and cloud-based environments, Giorgi says, “We’ve found that 94% of organizations have the ability to get impacted or to have their…