Threat actors are devious and persistent to say the least. Consequently, the practice of threat analysis requires a similar mindset of unrelenting determination and doggedness. Join Steve Miller and Amar Singh as they share a glimpse of this exciting world and examine the various toolsets, methodologies and processes employed by threat analysts to ask and answer complicated questions about cyber threats. We will preview a day in the life of a threat intelligence analyst in the context of incident and malware attribution.
This technical webinar will cover:
* . Role of an intelligence analyst
* . Typical challenges and questions
* . Tools and processes used to find answers
* . Case study on attributing an intrusion set
Amar Singh is a globally recognised CISO and trusted advisor to FTSE 100 and other organisations. He also is the founder of Cyber Management Alliance Ltd, Give01Day and Wisdom of Crowds.
Steve Miller is an incident response professional and a threat intelligence analyst at Anomali. Steve came to Anomali from Mandiant, where he built security operations centers around the world, conducted hundreds of intrusion investigations and, of course, chased down a lot of evil – work that directly led to the discovery of tons of new zero-days, APT malware families, and targeted attack campaigns.
Prior to joining Mandiant, Steve conducted research and special projects for federal government agencies the U.S. Department of Homeland Security and the U.S. Department of State.