Nip ransomware in the FUD: Detecting attacks pre-encryption
Starts: April 21st, 2021 2:00PM ET
Ends: April 21st, 2021 3:00PM ET
Ransomware operators are evolving their tactics, techniques, and procedures to become more difficult to detect. Recorded Future’s cyber threat analysts researched malicious actors using existing network applications (“living-off-the-land”) open-source resources, and red team tools, with a specific focus on “big game” ransomware operators. This research was conducted to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase. The team looked at actual compromises by ransomware operators, analyzing their techniques, procedures, and tool usage to derive detections.
In this webcast you’ll learn:
• best practices and methodologies to detect threats;
• specific examples of actual compromises by ransomware operators; and
• how to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase.
Attendees of this webcast may be eligible for one CPE credit.
Director of Operational Outcomes for Insikt Group
Lindsay Kaye’s primary focus is driving the creation of actionable technical intelligence – providing endpoint, network and other detections that can be used to detect technical threats to organizational systems. Lindsay’s technical specialty and passion is malware analysis and reverse engineering. She received a BS in Engineering with a Concentration in Computing from Olin College of Engineering and an MBA from Babson College.