Using the Hacker Supply Chain to Get Ahead of the Attack [Threat Hunting Series]

Logo
Presented by

Ido Wulkan, Security Researcher and Intelligence Team Lead at IntSights

About this talk

Cyber attacks don't just happen. You need an attacker who is motivated, has infrastructure, seeks resourcing and performs reconnaissance. And all this happens before the attack. Ironically, most security vendors focus on blocking or identifying activity at the point of attack. But what if you could identify attacks during development, during the hacker supply chain? Clear and effective visibility into the attack chain would give security teams a dramatic ability to predict attacks, girding before the attack even begins. In this webinar, security researcher Ido Wulkan will help you understand where to look, what to look for and how to do it. About the Presenter: Ido has a decade of experience in intelligence research and analysis, focusing on the deep and dark web. Ido served in one of the leading intelligence units of the Israeli Defense Force (IDF) as a cyber intelligence analyst, where he gained intimate knowledge of various threat actors and their techniques. Following his service, Ido worked at several intelligence firms as an analyst and team leader, where he expanded his knowledge of cybercrime ecosystems. Ido now leads IntSights’ cyber intelligence analysts team, where he serves as a focal point for all IntSights’ intelligence.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (13)
Subscribers (3837)
IntSights, now a Rapid7 company, enables organizations of any type or size to gain the full benefits of external threat intelligence, no matter the size or sophistication of their threat intelligence programs. Unlike any other solution on the market, IntSights takes the complexity out of threat intelligence and delivers instant value without the heavy lift or sizable resource allocation that traditional threat intelligence solutions require. Designed to scale, IntSights is for any company, and frictionless integration of our real-time cyber threat intelligence with existing security infrastructure allows enterprises to maximize return on investment.