Threat Hunting Lessons: Adversary Tools, Tactics & Procedures

Presented by

David Low, GuidePoint Director of Technology Solutions; and Michael Godin, RSA Senior Systems Engineer

About this talk

Today’s attackers use advanced techniques and tools to compromise systems and hide among normal activity. Did you know that most successful attacks have gone undiscovered by a logs-only approach? This can lead to theft of sensitive information, disruption of business operations, or destruction of assets and damage to your business’ reputation. We will examine tools and tactics today’s attackers use and demonstrations of attack scenarios including: • Webshells • Spear phishing • Dynamic DNS • Data exfiltration Attendees will learn about: • Real-world examples of how attackers enter and move through an environment • Strategies Virtual Security Operations Center (vSOC) analysts and incident responders use to actively hunt for attacks • Tools to quickly identify threats in your SOC

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (3)
Subscribers (1033)
GuidePoint Security