Cybersecurity , Events , Healthcare Information Security Summit

Anatomy of an Attack
Anatomy of an Attack

Cybercriminals are increasingly exploiting internet services to build agile and resilient infrastructures, and consequently to protect themselves from being exposed and stopped. This session will look at recent attacks and explain how the correlation of internet data from multiple levels - DNS, BGP, ASN and prefixes/IPs - can be used to expose the attackers' infrastructure.

See Also: Effective Cyber Threat Hunting Requires an Actor and Incident Centric Approach



Around the Network