Cyber-Espionage: Out of the shadows. Into the digital crosshairs

Просмотров: 1, 337   |   Загружено: 4 год.
icon
SANS Digital Forensics and Incident Response
icon
35
icon
Скачать
iconПодробнее о видео
Cyber-Espionage breaches pose a unique challenge. Through advanced techniques and a specific focus, Cyber-Espionage threat actors seek to swiftly gain access to heavily defended environments, laterally move with stealth, efficiently obtain targeted assets and data, and move out smartly (or even stay back and maintain covert persistence). The Verizon Cyber-Espionage Report (CER) is our first-ever data-driven publication that focuses on advanced cyberattacks as reflected in the DBIR “Cyber-Espionage” pattern. We've examined seven years (2014-2020) of Data Breach Investigations Report (DBIR) data for Cyber-Espionage breaches and all breaches.

John Grim, Distinguished Architect | Head of Research, Development, Innovation, Verizon Threat Research Advisory Center

View upcoming Summits:
Download the presentation slides (SANS account required) at

#CTISummit #cyberthreatintelligence

Похожие видео

Добавлено: 55 год.
Добавил:
  © 2019-2021
  Cyber-Espionage: Out of the shadows. Into the digital crosshairs - RusLar.Me