Threat Intelligence/Operations

Keep Your Enemies Close: A Panel on Tracking Adversaries


Virtual Breakout October 7, 2020 12:00 pm - 12:40 pm

Bookmark and Share

Michael Francess
Andrew List
Derek Thomas

TLP:AMBER – RH-ISAC CORE MEMBERS ONLY

At any given moment there are countless nefarious attackers, methods, and tools targeting the retail and hospitality sector. As a threat intelligence analyst, it’s your job to have a response process in place if, and when, an attack breaks through the cracks. By tracking adversary behavior, threat intelligence teams can better detect and defend against targeted attacks. Leading threat intel and information security analysts from the RH-ISAC community discuss what tools and processes they’re leveraging to monitor their cyber adversaries and share some of the latest high-profile threat actor tactics, techniques, and procedures (TTPs) they’ve seen emerge.

 

Retail and Hospitality ISAC