VIDEO
New Trends in Cyber Incident Response and Forensics
Video Summary:
Learn the new trends in cyber incident repons and forensics from industry experts Sherri Davidoff and Matt Durrin! Cybercrime has evolved rapidly, and we all need to update our response techniques to match. Today's adversaries are targeting suppliers, leveraging zero-day vulnerabilities, and leveraging malware-free attacks to evade detection. At the same time, remote work capabilities and the shift to the cloud have greatly increased the attack surface. How should you respond to modern cybersecurity incidents? More importantly, how can you detect evidence of an intrusion early enough to minimize or prevent damage? In this talk, we will highlight: - New response trends and the changing threat landscape - Supply-chain incidents such SolarWinds - Mass 0-day exploits, such as Log4j - Malware-free attacks and detection strategies - Incident notification trends Join us and get practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.
Learn the new trends in cyber incident repons and forensics from industry experts Sherri Davidoff and Matt Durrin! Cybercrime has evolved rapidly, and we all need to update our response techniques to match. Today's adversaries are targeting suppliers, leveraging zero-day vulnerabilities, and leveraging malware-free attacks to evade detection. At the same time, remote work capabilities and the shift to the cloud have greatly increased the attack surface. How should you respond to modern cybersecurity incidents? More importantly, how can you detect evidence of an intrusion early enough to minimize or prevent damage? In this talk, we will highlight: - New response trends and the changing threat landscape - Supply-chain incidents such SolarWinds - Mass 0-day exploits, such as Log4j - Malware-free attacks and detection strategies - Incident notification trends Join us and get practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.