DebUNCing Attribution to Counter Threats More Effectively

Presented by

Kelli Vanderlee Manager, Intelligence Analysis, Mandiant and Jeff Guilfoyle, Principal Product Manager, Mandiant

About this talk

Malicious cyber operations are not a force of nature. Instead, behind every compromise are human operators using tools and techniques to accomplish various goals. As a result, when reading about a malware campaign like “SUNBURST”, security practitioners try to answer essential questions like “Who could be behind this attack?” “What are they trying to accomplish?” or “How do they operate?” Solving these questions is often easier said than done. Actionable threat intelligence can provide unique insight so that security teams act in concert, quickly understand risks, prioritize resources to take the most effective countermeasures. Join our host, Bart Lenaerts-Bergmans, Sr. Product Marketing Manager, Mandiant with presenters, Kelli Vanderlee, Sr. Manager, Analysis, Mandiant and Jeff Guilfoyle, Principal Product Manager, Mandiant Advantage, as we explore key concepts: • How modern attribution works and the analytic processes • Understanding new actors (uncategorized) and which details to pay attention to • Navigating recent threat actor UNC2452 and Sunburst Malware using Mandiant Advantage

Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (424)
Subscribers (92181)
Mandiant provides public and private organizations and critical infrastructure worldwide with early threat insights through unmatched intelligence and response expertise for the highest-profile incidents.