A Bear, Panda and a Spider walk into a bar: A European Cyber Threat Landscape Review
Join us for an ultra-fast review of the last 12 months in cyber-crime, threat actor exploits and hacktivist tactics in this keynote session. Today’s cyber threats are particularly alarming due to the widespread use of hands-on or “interactive intrusion” techniques, which involve adversaries actively executing actions on a host to accomplish their objectives. Unlike malware attacks that depend on the deployment of malicious tooling and scripts, interactive intrusions leverage the creativity and problem-solving skills of human adversaries. These individuals can mimic expected user and administrator behaviour, making it difficult for defenders to differentiate between legitimate user activity and a cyberattack. CrowdStrike will share the activities of the adversary while sharing easy methods to thwart and stop them.