Experience Sunburst first hand with the experts

Logo
Presented by

Chris Pace, Kev Breen, Sean Wright

About this talk

In a world built on software, the fallout from Sunburst is an example of the importance of a secure SDLC. With a few more checks and balances, nation-state actors might not have been able to weaponize the SolarWinds application and bend it to their will and compromise everything from Government entities to tech companies. Join our Director of Cyber Threat Research, Kev Breen, and Sean Wright, Lead Application Security SME, as they demonstrate a series of labs on this unprecedented threat to organizations. By starting with foundational concepts and moving through to detailed hands-on simulations, you will learn firsthand the critical lessons underlined by the attack on Solarwinds. Using the gamified Immersive Labs platform, you will be guided through a five-part series, featuring: 1) Compromising SolarWinds NMS – Theory: What is an NMS, why is it a target and how was it attacked? 2) Who is Cozy Bear – Theory: Using MITRE, understand how the infamous UNC2452 threat actor operates 3) Build Server Investigation – Practical: Our experts use our platform to simulate being a threat hunter and show how to review a build server and pipelines to identify malicious code injects 4) IOC Investigation – Practical: We walk through the indicators of compromise to demonstrate how to review your NMS host and identify if it has been infected 5) Malware Investigation – Practical: Kevin and Sean step into the shoes of a threat hunter, analyse the Sunburst malware to understand further IoCs, and discern what suspicious network activity looks like You can access these practical hands-on experiences for yourself from Immersive Labs Community here: https://community.immersivelabs.online/browse/category/cyber-threat-intelligence/sunburst-supply-chain-compromise
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (9)
Subscribers (2217)
We empower organizations to increase, measure and demonstrate human capabilities in every part of their cybersecurity.