Uncovering advanced persistent threats

Thursday, June 6, 2019

2:00 p.m. ET/ 11:00 a.m. PT

In one of the largest ever sustained global cyber espionage campaigns known as Operation Cloud Hopper, a Chinese threat actor group dubbed APT10 was able to infiltrate managed IT service providers to gain unprecedented access to their clients' intellectual property and sensitive data. Leveraging "Red Leaves" malware, attackers were able to breach and freely move about laterally in their unsuspecting victims' environments.

Join us and Tristan Morris, cybersecurity strategist at Carbon Black, as he walks us step-by-step through how the attack unfolded and how security professionals can implement automated defenses to detect malicious behavior like APT10's attack before the breach occurs.

We will cover:

  • Why threat hunting is so critical today
  • How new intel can kick off a threat hunt
  • How to quickly hunt across your enterprise
  • How to scale your future threat hunts leveraging automation
SC vendor webcast
Tristan Morris
Security Strategist
Carbon Black

Registration details:

By registering you are accepting our Privacy Policy and Terms of Use.

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.

(*) denotes required form field(s)