Attack Psychology - Using Behaviour to Identify Threats (sponsor presentation)

Presented at VB2016, Oct. 5, 2016, 5 p.m. (30 minutes)

Most security products leverage threat research focused around the anatomy of threats - using their structural makeup or the behaviour they exhibit *after* their attack is successful. But what happens *before* their success, when threats blend in so well with legitimate events, even during their execution, that they bypass all those security products designed to prevent them? Even the most well-designed threats act in ways that are different from how legitimate traffic, users, and devices behave based simply on the fact that their end goals are different. Learn how advanced threats behave and what kinds of behavioural indicators to look for.



Similar Presentations: