Description
In any cyber attack, adversaries must maintain a presence within the target environment to achieve their objectives. Whether aiming to disrupt critical infrastructure, spy on and extract data from industrial or intellectual targets, or execute a ransomware operation, sustained access is crucial.
Persistence provides stable access, enabling adversaries to better explore, move laterally, gather information, and generally impact the environment. Even those seeking a quick victory prefer to leave a backdoor for potential future access.
We will explore and analyze techniques observed in real attacks carried out by a diverse range of adversaries, from nation-state-sponsored actors to less sophisticated criminals.
Additionally, we will discuss the efforts required to effectively detect and neutralize ongoing attacks before they reach their goals.
Optional: Speaker / convener biography
Hasain, also known as "The Wolf", is an industry-leading cyber security expert with more than 30 years of experience.
He has extensive and deep expertise from numerous design projects, security audits, advanced implementation projects, incident response, digital forensic, threat hunting and penetration testing. He helps customers understand and build solutions to protect, detect and respond to cyber threats for enterprises, government agencies, banks, military organizations among others.
Due to his expertise, he is a sought-after advisor, speaker and a popular instructor. For his many achievements over the years, Hasain has been awarded recognition as “Sweden’s leading IT security expert” and Microsoft MVP in Enterprise Security and Cloud & Datacenter.
| Length | 60 minutes |
|---|