mlns='http://www.w3.org/1999/xhtml'>
Expert cyber threat analysts discuss best practices and methodologies
Ransomware operators have begun to shift their malicious behavior before encrypting files. This tactic has made it more difficult for an organization to distinguish from legitimate user activity through the use of applications already installed on network systems ("living-of-the-land" techniques), off-the-shelf red team tools, and Windows utilities. Recorded Future's team of expert cyber threat analysts researched malicious actors with a specific focus on "big game" ransomware operators. Attend this webinar to find out what they discovered. In this webinar you'll get: Best practices and methodologies that organizations can use to detect threats Specific examples of actual compromises by ransomware operators, analyzing their techniques, procedures and tool usage to derive detections Guidance on how to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase |
|
|
|
Lindsay Kaye Director of Operational Outcomes for Insikt Group Recorded Future |
|
|
|
Having Register through this promotion and attend the live webinar on March 16, 2021 for your chance to receive a $10 Amazon.com gift card. Valid for the first 25 live attendees in the U.S and Canada. This offer is not sponsored, endorsed or administered by Amazon.com®. | Having trouble viewing this email? View Web Version |
|
|
|
|