The Art of War—Threat Intelligence and the Power of Attribution
This webinar addresses the topic of attribution. We tend to forget that malware and other cyber threats are always man-made. What are the benefits of doing attribution operations? We'll show the importance of threat modeling, particularly threat actor profiling.
Andrew De Lange, Senior Solutions Engineer at Anomali, covers how the days of being blind to the who, how, and why, in incident response operations are over. Intelligence about our adversaries is what enables us to respond and often predict what is happening. The situational awareness analysts require arises from knowing their adversary but also knowing themselves.
Mark Arena, CEO, and founder at Intel 471 discusses numerous ways we can observe our cyber threat adversary, be it, criminals, nation-states, or hacktivists. Attendees will be armed with approaches to tracking threat actors that support a number of common cyber threat intelligence (CTI) use cases and stakeholders.
- Incident-centric and actor-centric approaches within CTI as well as additional sources of intelligence and information collection for their threat activities
- Threat modeling - actor profiling and threat indicator expansion
- Strategies for threat intelligence teams and the players involved in underground activities
Register today to keep your security team one step ahead!