Cyber Threats have changed drastically over last three decades. From being a nuisance, they have evolved into
1. A financial instrument for Cyber Attackers, with ransomware being the primary tool in attackers’ arsenal
2. A tool to sabotage operations or exfiltrate sensitive information, using sophisticated attack techniques known as Advanced Persistent Threats (aka APTs)
Attack groups behind APTs are highly sophisticated and well-funded. This enables them to invest heavily in reconnaissance & design attacks before launching them against intended target. Because of this elaborate planning & inherent complexity, such attacks are extremely hard to detect & protect against. As more & more critical infrastructure systems have started
utilizing digital technologies, risk posed by APTs has gone up substantially.
In this presentation we will discuss:
• What are APTs
• Example of APT attacks
• APT attacks against Operational Technology
• How to safeguard