Attack Psychology – Using Behaviour to Identify Threats (sponsor presentation)

Wednesday 5 October 17:00 - 17:30, Red room

Lindsey Lack (E8 Security)

Most security products leverage threat research focused around the anatomy of threats — using their structural makeup or the behaviour they exhibit after their attack is successful.

But what happens before their success, when threats blend in so well with legitimate events, even during their execution, that they bypass all those security products designed to prevent them?

Even the most well-designed threats act in ways that are different from how legitimate traffic, users, and devices behave based simply on the fact that their end goals are different. Learn how advanced threats behave and what kinds of behavioural indicators to look for.


Click here for more details about the conference.


We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.