Turning Fossils Into Gold: How to Use Historical Data to Prevent Future Attacks
Most cyberattacks are not one-and-done affairs. Attackers continue to create and deploy infrastructure online to carry out a variety of malicious activities. When the campaign is very targeted in nature, it may not be reported to threat intelligence feeds. However, attackers often leave behind clues that a savvy analyst can use to build a map of existing infrastructure—and even to keep an eye on the attacker’s future moves.
In this webinar, you will learn
- How to build maps of attacker infrastructure based on a single starting point
- How to develop a “John Doe” profile of an attacker, or in some cases identify them outright
- How to stay a step ahead of the attacker by monitoring their future moves