Incident & Breach Response , Security Operations
Tracking 'Attacker Indicators'
Noam Jolles of Diskin Advanced Technologies on AttributionHow can CISOs put "attacker indicators" to use in developing security defenses in a timely way? Noam Jolles of Diskin Advanced Technologies explains the importance of this aspect of attribution.
See Also: Are You APT-Ready? The Role of Breach and Attack Simulation
"It's not about who the attacker is; it's about what would be his patterns, his behavioral patterns," she says.
In a video interview at Information Security Media Group's New York City Fraud and Breach Summit, Jolles, who was a featured speaker, also discusses:
- The difference between indicators of compromise and indicators of attackers;
- How attacker attribution helps with the timely development of security strategies;
- How a single indicator can be predictive of future attacks.
Having almost two decades of experience in intelligence operations, training and designing of new approaches and methods, Jolles currently directs intelligence research and development at Diskin Advanced Technologies, a startup Israeli cybersecurity company.