DebUNCing Attribution to Counter Threats More Effectively

Logo
Presented by

Kelli Vanderlee Manager, Intelligence Analysis, Mandiant and Jeff Guilfoyle, Principal Product Manager, Mandiant

About this talk

Malicious cyber operations are not a force of nature. Instead, behind every compromise are human operators using tools and techniques to accomplish various goals. As a result, when reading about a malware campaign like “SUNBURST”, security practitioners try to answer essential questions like “Who could be behind this attack?” “What are they trying to accomplish?” or “How do they operate?” Solving these questions is often easier said than done. Actionable threat intelligence can provide unique insight so that security teams act in concert, quickly understand risks, prioritize resources to take the most effective countermeasures. Join our host, Bart Lenaerts-Bergmans, Sr. Product Marketing Manager, Mandiant with presenters, Kelli Vanderlee, Sr. Manager, Analysis, Mandiant and Jeff Guilfoyle, Principal Product Manager, Mandiant Advantage, as we explore key concepts: • How modern attribution works and the analytic processes • Understanding new actors (uncategorized) and which details to pay attention to • Navigating recent threat actor UNC2452 and Sunburst Malware using Mandiant Advantage
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (424)
Subscribers (118138)
Mandiant is a recognized leader in dynamic cyber defense, threat intelligence and incident response services. By scaling decades of frontline experience, Mandiant helps organizations to be confident in their readiness to defend against and respond to cyber threats. Mandiant is now part of Google Cloud.