Name
C4. The Anatomy of an Orchestrated Attack: Information Hijacking
Track
Emerging Trends
Date
Wednesday, June 9, 2021
Time
10:00 AM - 11:00 AM
Description

In order to prepare an effective and coherent cyber defense strategy in any organization, an important ally is knowledge. Knowing what tactics, techniques, and procedures that a real attacker uses to carry out an orchestrated attack will always provide a real advantage when designing and/or executing strategies that allow for detecting, preventing, containing and responding to advanced persistent threats. In this talk, we will explain in detail how a particular attack orchestrated from the point of view of a cyber threat actor (APT group) is executed.

Learner Objectives

After completing this session, learner will: - Understand the planning and elaboration of artifacts, - Understand the execution and specific techniques that are used in information hijacking - Understand evasion, propagation, and exposure. - Understand how it is possible to carry out a real emulation of these orchestrated attacks in order to understand the true effectiveness of cybersecurity solutions oriented to the containment and response of advanced persistent threats.