Deconstructing Path-Based Attacks - Cyber-Espionage Breaches

Logo
Presented by

Verizon's John Grim, Scott Carter, Kevin Horvath and Matthew Clark

About this talk

Cyber-Espionage breaches pose a unique challenge. Through advanced techniques and a specific focus, Cyber-Espionage threat actors seek to gain access to heavily defended environments, laterally move with stealth, efficiently obtain targeted access and data, and move out smartly (or even stay back and maintain covert persistence). For this panel, we'll deconstruct the attack paths taken by these advanced threat actors. Specifically, we'll leverage the findings in Verizon’s Cyber-Espionage Report as well as the NIST Cybersecurity Framework, the Center for Internet Security Critical Security Controls, the VERIS Framework, and the Verizon Incident Preparedness and Response (VIPR) Phases. And, we'll discuss solutions, to include Managed Detection and Response, Red Teaming / Penetration Testing, Cyber Threat Intelligence, and Investigative Response activities to mitigate, detect, and respond to Cyber-Espionage attacks. Tune in and learn about Cyber-Espionage: • Threat actor tactics, techniques and procedures (TTPs) • Attack paths typically taken by these advanced threat actors • Controls and solutions to protect from, detect, and respond to these threat actors
Related topics:

More from this channel

Upcoming talks (14)
On-demand talks (496)
Subscribers (62897)
We deliver the promise of the connected world. In today’s rapidly transforming environment, we integrate, secure and operate the networks, and mobile technologies that help businesses and governments around the globe expand reach, increase productivity, improve agility, and maintain longevity. Our solutions across Connectivity, Security and Advanced Business Communications are designed to help enterprises pursue new possibilities and create entirely new revenue streams – more efficiently than ever.