Preparing for Cyber War: Learnings from Responding to Disruptive Breaches

Logo
Presented by

Charles Carmakal;. VP, Strategic Services CTO, Mandiant; Jeremy Koppen; Manager, Mandiant

About this talk

Some threat actors are motivated by money, some want fame and glory, some want to influence our decisions, and some just want to see the world burn. Threat actors will go to extreme measures to achieve their objectives. The rules of engagement have changed. Over the past two years, we have observed a significant rise in aggressive attacks—extortion, public shaming, destruction, intentional business disruption and even threats to human safety. This talk will walk through several attacks observed on the front lines by the presenters. We'll include: • an overview of the threat actors and their motivations. • a discussion of the TTPs employed by aggressive threat actors. • several case studies • suggestions for preparing for and responding to aggressive threat actors Learning Objectives: •Educate the audience on aggressive intrusions by walking through several case studies. Explain motivations by threat actors. •Provide guidance on dealing with extortion, public shaming and destructive attacks. •Determine how to spot scammers that attempt to extort businesses.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (107)
Subscribers (21194)
(ISC)² Security Congress channel contains digital content of activities at (ISC)2's Flagship conference event. You'll find keynotes, sessions and related items.