National Webcast Initiative
Keys to Defending Against Advanced Persistent Threat
Thursday, December 13th
2:00pm -- 3:00pm (Eastern)
Technical Director, Security Solutions
In this presentation we examined the nature of State-sponsored cyber espionage. We took a look at its distinctions and how it differs from normal cyber-crime. From there, we discussed the phases involved in a targeted attack, known as the Kill-Chain, and the tactics, techniques and procedures used by these attackers. Most importantly of all we discussed things an organization can do along each link in the Kill-Chain to disrupt the attackers operations and prevent a full exfiltration of the victim organizations targeted data.
Format of Webcast:
This session featured an interactive Powerpoint presentation accompanied by audio.
Webcast Related Material:
[These links are provided because they have information that may be useful. The Multi-State Information Sharing and Analysis Center (MS-ISAC) does not warrant the accuracy of any information contained in the links and neither endorses nor intends to promote the advertising of resources listed herein. The opinions and statements contained in such resources are those of the author(s) and do not necessarily represent the opinions of the MS ISAC.]