Automated Threat Intelligence- Detect Advanced Malware and Protect Big Data
Jim Deerman, Head of Engineering, ISC8 Secure and Scott Millis, Chief Security Strategy Officer, ISC8 Secure
About this talk
Join us to explore the concept of using automated tactical intelligence in the war against advanced malware. Cybersecurity solutions must be able to identify the tactical steps of the kill chain of sophisticated attacks and Advanced Persistent Threats (APTs). By automatically identifying these tactical steps and alerting the operator, the malware can be stopped prior to devastating damage or critical data theft occurring. Explore how these next-gen solutions utilize network topology and knowledge of advanced malware’s tactics to identify hosts that have been compromised. Unlike other tools that only work on a single event or signature, advanced threat detection solutions must be able to analyze and correlate network activities over weeks or months to identify the most sophisticated attacks - and do it automatically, saving valuable forensic analysts time and reducing the likelihood of missing serious bad actors.
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.…