5 July, 14.30 – 14.50, Theatre 1
Cyber attacks have become increasingly complex and dynamic, and network defences are having trouble keeping up. Traditional securities tools have relied on signatures and pre-defined rules to detect and eradicate malicious software. Security frameworks also tout perimeter defences and defence-in-depth as the tried-and-tested approach to designing a secure IT infrastructure. However, advancements in covert malware exploitation technologies and the evaporation of corporate boundaries have reduced the effectiveness of these security axioms. By combining the investigative experience of forensic professionals with the multi-dimensional discovery capability of data science, we have developed our proprietary cyber threat hunting services to assist your organisation with identifying undetected anomalies and threats.
In this session, we will share with you some of our threat hunting techniques and how we can leverage on the information existing in our network to give us back the competitive edge in this cyber war that we wage daily.