
This talk will cover how the team has applied traditional intelligence techniques into its ways of working, including introducing “surges” and how these have helped challenge the team’s assessments. A case study will be presented that shows how a variety of different analysis techniques have been applied to avoid bias, as well as the lessons learned from their application. This talk will not only provide attendees with practical examples of analytical techniques in action and how they can refocus threat actor attribution, but will also explore how recognizing bias can support threat intelligence being used effectively by security teams.
Rachel Mullan (@jadedmuse), Strategic Threat Intelligence Lead, PricewaterhouseCoopers LLP
Jason Smart, Technical Threat Intelligence Lead, PricewaterhouseCoopers LLP