Anthony Stitt, Regional Director and Robert Streamer, Threat Intelligence Engineer
Spear phishing emails contain a wealth of hidden evidence that can be used to track and understand the methods used by attackers to target an organization. By extracting that information, analysts can better understand what to look for to identify other users that may also have been caught. A Threat Intelligence platform can assist analysts to discover associations between multiple spearphishing messages. This helps determine if a wider campaign is underway. In this webinar we will show you how to compare indicators from an email against the data in the threat library and determine the associated risk, thus allowing prioritization and noise reduction. In this webinar, you will also learn how to ingest suspicious email, extract information and then perform initial analysis, advanced investigation techniques (including victimology).