2020 Delhi Cybersecurity Summit , Cybercrime , Events

APT Detection: Critical Factors

Mahesh Sogane of Shell Offers Strategic Insights on Keys to Detection Success
Mahesh Sogane, global lead, cyber defense, monitoring and incidence response, Shell

When it comes to detecting an advanced persistent threat attack, the key to success is not only looking at what are anomalies in the network, but also understanding why certain activities are suspicious, says cybersecurity specialist Mahesh Sogane of the global oil company Shell.

See Also: The Financial Services Security Disconnect

"The attention to detail when things are termed as non-anomaly is where you need to look at to find that dormant file which is evading all your controls. That's the key to success to find an APT," Sogane says.

In a video interview at Information Security Media Group's Cybersecurity Summit in New Delhi, Sogane also discusses:

  • How to detect APT attacks;
  • Insights on how the APT attacks are evolving;
  • Cybersecurity trends that will dominate 2020.

Sogane is the global lead, cyber defense, monitoring and incidence response, at Shell. Previously, he was the global manager for the security incident response team Goldman Sachs. He has more than two decades of experience in identifying technology risks leading to financial and business risks.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Suparna Goswami is Associate Editor at ISMG Asia and has more than 10 years of experience in the field of journalism. She has covered a variety of beats ranging from global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine, and leading Indian newspapers like DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.