Artwork

Treść dostarczona przez Mimecast. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Mimecast lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

Advanced Persistent Threat Groups: Preparing Instead of Hoping

25:29
 
Udostępnij
 

Manage episode 332799320 series 2945506
Treść dostarczona przez Mimecast. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Mimecast lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

In this episode of Phishy Business, we take a look at advanced persistent threat groups, also known as APT Groups. Special guest Krijn de Mik, Incident Response and Intelligence Lead at Hunt & Hackett, where he specializes in investigations, forensic analysis, and tracking threat actors and threat actor groups, gives his insight on how organizations can protect themselves from APT Groups and their advanced cyberattacks.

In ‘Advanced Persistent Threat Groups: Preparing Instead of Hoping’, we discuss:

  • What advanced persistent threat groups are, their tactics, their motivations, how large and organized they can be, and why we distinguish them as threat actors
  • The ransom amounts that APT Groups seek, how and why the amounts differ by industry and victim, and the three most targeted industries (listen to learn which three)
  • To pay or not to pay – some of the things that organizations should consider and what they should do when it comes to making this decision
  • How prevention remains an organization’s best bet and how prevention tactics such a table-top and crisis management exercises can help organizations prepare for attacks and reduce chaos
  • One of the largest-scale and most fascinating APT group hacks Krijn and Hunt & Hackett have investigated
  • The importance of:

o Forensic readiness and how it can be achieved

o Two-factor authentication

o Backups and how organizations need to ensure they are complete

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

  continue reading

65 odcinków

Artwork
iconUdostępnij
 
Manage episode 332799320 series 2945506
Treść dostarczona przez Mimecast. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Mimecast lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

In this episode of Phishy Business, we take a look at advanced persistent threat groups, also known as APT Groups. Special guest Krijn de Mik, Incident Response and Intelligence Lead at Hunt & Hackett, where he specializes in investigations, forensic analysis, and tracking threat actors and threat actor groups, gives his insight on how organizations can protect themselves from APT Groups and their advanced cyberattacks.

In ‘Advanced Persistent Threat Groups: Preparing Instead of Hoping’, we discuss:

  • What advanced persistent threat groups are, their tactics, their motivations, how large and organized they can be, and why we distinguish them as threat actors
  • The ransom amounts that APT Groups seek, how and why the amounts differ by industry and victim, and the three most targeted industries (listen to learn which three)
  • To pay or not to pay – some of the things that organizations should consider and what they should do when it comes to making this decision
  • How prevention remains an organization’s best bet and how prevention tactics such a table-top and crisis management exercises can help organizations prepare for attacks and reduce chaos
  • One of the largest-scale and most fascinating APT group hacks Krijn and Hunt & Hackett have investigated
  • The importance of:

o Forensic readiness and how it can be achieved

o Two-factor authentication

o Backups and how organizations need to ensure they are complete

About Phishy Business

Fed up with the same old cybersecurity stories? Come with us on a journey that explores the lesser-known side. Whether it’s social engineering, taking criminals to court or the journalists hunting down hackers — our new podcast series, Phishy Business, looks for new ways to think about cybersecurity. Mimecast’s very own Brian Pinnock and Alice Jeffery are joined by guests from a range of unique security specialisms. Each episode explores tales of risk, reward and just a dash of ridiculousness to learn how we can all improve in the fight to stay safe. For more tales of risk, reward and ridiculousness, subscribe to Phishy Business on iTunes, Spotify, Anchor or wherever you get your podcasts.

www.mimecast.com

  continue reading

65 odcinków

Wszystkie odcinki

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi