TLP:AMBER – RH-ISAC CORE MEMBERS ONLY
At any given moment there are countless nefarious attackers, methods, and tools targeting the retail and hospitality sector. As a threat intelligence analyst, it’s your job to have a response process in place if, and when, an attack breaks through the cracks. By tracking adversary behavior, threat intelligence teams can better detect and defend against targeted attacks. Leading threat intel and information security analysts from the RH-ISAC community discuss what tools and processes they’re leveraging to monitor their cyber adversaries and share some of the latest high-profile threat actor tactics, techniques, and procedures (TTPs) they’ve seen emerge.