| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Every day, researchers and analysts are bombarded with new sets of data and information pertaining to threats and adversaries. This is not very different from what intelligence analysts encounter in physical terrain warfare. In both cases, intelligence can only succeed in looking beyond the ?flavor of the week? by applying timely, qualitative analysis to relevant information. In this presentation we will discuss:
Examples of observing common and older tactics and vulnerabilities that are actively being leveraged (instead of theoretical risks)
Using historical information to make well-informed assessments of future adversary courses of action
Applying qualitative-based risk assessments to adversaries based on observed capabilities and intent
Utilizing non-technical methods of intelligence collection such as human intelligence
We?ll also walk through real-life examples, including our hands-on experience in confirming tactics used by hacktivists during an actual campaign, and tracing suspected ties between a Middle Eastern paramilitary organization and a domestic cyber adversary.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast