In order to prepare an effective and coherent cyber defense strategy in any organization, an important ally is knowledge. Knowing what tactics, techniques, and procedures that a real attacker uses to carry out an orchestrated attack will always provide a real advantage when designing and/or executing strategies that allow for detecting, preventing, containing and responding to advanced persistent threats. In this talk, we will explain in detail how a particular attack orchestrated from the point of view of a cyber threat actor (APT group) is executed.
After completing this session, learner will: - Understand the planning and elaboration of artifacts, - Understand the execution and specific techniques that are used in information hijacking - Understand evasion, propagation, and exposure. - Understand how it is possible to carry out a real emulation of these orchestrated attacks in order to understand the true effectiveness of cybersecurity solutions oriented to the containment and response of advanced persistent threats.