Wednesday 5 October 17:00 - 17:30, Red room
Lindsey Lack (E8 Security)
Most security products leverage threat research focused around the anatomy of threats — using their structural makeup or the behaviour they exhibit after their attack is successful.
But what happens before their success, when threats blend in so well with legitimate events, even during their execution, that they bypass all those security products designed to prevent them?
Even the most well-designed threats act in ways that are different from how legitimate traffic, users, and devices behave based simply on the fact that their end goals are different. Learn how advanced threats behave and what kinds of behavioural indicators to look for.