How Attackers Confuse Investigators with Cyber False Flag Attacks

Logo
Presented by

Jake Williams, Co-founder of Rendition Infosec // Vince Stross, Principal Security SE

About this talk

During cybersecurity compromise investigations, incident responders are always asked the question “who did this to us and why?” To the extent that attribution matters in cybersecurity, false flag cyberattacks offer opportunities to misdirect investigators in both dimensions – the who and the why. In this webcast, we'll demonstrate techniques showing how attackers can plant forensic evidence, misdirecting investigators about their intentions and identities. Armed with this information, forensic investigators and incident responders will (hopefully) be more critical of the information discovered in their cases and dig a little deeper in investigations.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (131)
Subscribers (11594)
The prevention and protection model of cybersecurity isn’t working: between the cloud, IoT, and the sheer pace of change, the enterprise is no longer built to be walled in. This channel provides educational webinars to help SecOps (SOC) and NetOps (NOC) teams, from CIOs and CISOs to analysts and practitioners, change their perspective in order to identify, investigate, and respond to threats across the modern attack surface. We explore how cloud-native network detection and response (NDR) provides the complete visibility, real-time threat detection, and intelligent response you need to secure your hybrid environment. You’ll also find product information about ExtraHop Reveal(x) which enables you to: Eliminate blind spots: Cover 100% of your hybrid environment, Detect what matters: Find threats 95% faster, and Act quickly: Respond to breaches 70% faster. Learn more at www.extrahop.com