Cyber-Espionage breaches pose a unique challenge. Through advanced techniques and a specific focus, Cyber-Espionage threat actors seek to gain access to heavily defended environments, laterally move with stealth, efficiently obtain targeted access and data, and move out smartly (or even stay back and maintain covert persistence).
For this panel, we'll deconstruct the attack paths taken by these advanced threat actors. Specifically, we'll leverage the findings in Verizon’s Cyber-Espionage Report as well as the NIST Cybersecurity Framework, the Center for Internet Security Critical Security Controls, the VERIS Framework, and the Verizon Incident Preparedness and Response (VIPR) Phases. And, we'll discuss solutions, to include Managed Detection and Response, Red Teaming / Penetration Testing, Cyber Threat Intelligence, and Investigative Response activities to mitigate, detect, and respond to Cyber-Espionage attacks.
Tune in and learn about Cyber-Espionage:
• Threat actor tactics, techniques and procedures (TTPs)
• Attack paths typically taken by these advanced threat actors
• Controls and solutions to protect from, detect, and respond to these threat actors