VIDEO
New Trends in Cyber Incident Response and Forensics – LMG Security
Video Summary:
Cybercrime has evolved rapidly, and we all need to update our response techniques to match. Today's adversaries are targeting your suppliers, disrupting business operations and engaging in novel extortion tactics. At the same time, there's been a seismic shift in the workforce: remote work capabilities and the shift to the cloud have greatly increased the attack surface. How should you respond to modern cybersecurity incidents, such as supplier backdoors, cloud hacking and remote worker malware infections? More important, how can you detect evidence of an intrusion early enough to minimize or prevent damage? In this talk,, industry experts Sherri Davidoff and Matt Durring will highlight: * New response trends and the changing threat landscape * Supply-chain incident tips & tricks * Coming soon: new supplier capabilities due to the recent U.S. Executive Order * How to manage remote worker compromise * Handling mass 0-day exploits, such as the recent Exchange vulnerability * Integrating threat hunting into your response operations Join us and get practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.
Cybercrime has evolved rapidly, and we all need to update our response techniques to match. Today's adversaries are targeting your suppliers, disrupting business operations and engaging in novel extortion tactics. At the same time, there's been a seismic shift in the workforce: remote work capabilities and the shift to the cloud have greatly increased the attack surface. How should you respond to modern cybersecurity incidents, such as supplier backdoors, cloud hacking and remote worker malware infections? More important, how can you detect evidence of an intrusion early enough to minimize or prevent damage? In this talk,, industry experts Sherri Davidoff and Matt Durring will highlight: * New response trends and the changing threat landscape * Supply-chain incident tips & tricks * Coming soon: new supplier capabilities due to the recent U.S. Executive Order * How to manage remote worker compromise * Handling mass 0-day exploits, such as the recent Exchange vulnerability * Integrating threat hunting into your response operations Join us and get practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.