Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

APT 101: Understanding Advanced Persistent Threats

Автор: Hive Systems

Загружено: 2022-07-28

Просмотров: 14372

Описание:

Every day there’s a new headline about a ransomware attack, data stolen from a company, or another “zero-day vulnerability” that is being exploited. But who is carrying out these attacks, why are they doing it, and how? Is your company at risk?

This 60-minute discussion with Katie Dodson from Hive Systems will walk you through the basics of Advanced Persistent Threats, touching on both nation-state supported and cyber criminal hackers and answering questions like:
❯ What are these hackers trying to steal from me and my company?
❯ What are the motives behind their attacks?
❯ How are they carrying out these attacks and how can I recognize one before it’s too late?

Understanding the motives and ways that Advanced Persistent Threats carry out their attacks is critical for implementing security measures and protecting your company’s data. This discussion draws on Katie’s years of experience in cyber threat intelligence for the Department of Defense, and will cover some of the more prevalent Advanced Persistent Threats, their motives, and the common vectors used to carry out their attacks. Join us for our discussion and learn how to protect yourself from Advanced Persistent Threats today!

APT 101: Understanding Advanced Persistent Threats

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#5069 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "6YEs87n_f4o" ["related_video_title"]=> string(63) "Gone in 60 seconds: Crypto Attacks Leaving Victims High and Dry" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(12) "Hive Systems" } [1]=> object(stdClass)#5042 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "8xAuvl0Cp90" ["related_video_title"]=> string(48) "The Truth about Ransomware: Its not Complicated!" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(44) "SANS Digital Forensics and Incident Response" } [2]=> object(stdClass)#5067 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "CwSG5sa0Nao" ["related_video_title"]=> string(50) "Introduction To Advanced Persistent Threats (APTs)" ["posted_time"]=> string(27) "5 месяцев назад" ["channelName"]=> string(12) "HackerSploit" } [3]=> object(stdClass)#5074 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "EHD5hpnc6fY" ["related_video_title"]=> string(78) "LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated Ransomware" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> string(44) "SANS Digital Forensics and Incident Response" } [4]=> object(stdClass)#5053 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "dtZaXP6W3fA" ["related_video_title"]=> string(40) "APT Malware (advanced persistent threat)" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(12) "John Hammond" } [5]=> object(stdClass)#5071 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "01oeaBb85Xc" ["related_video_title"]=> string(71) "DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(16) "DEFCONConference" } [6]=> object(stdClass)#5066 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "95Mkwbsk2HQ" ["related_video_title"]=> string(79) "Можно ли поменять родину так быстро? / вДудь" ["posted_time"]=> string(19) "3 дня назад" ["channelName"]=> string(10) "вДудь" } [7]=> object(stdClass)#5076 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "A_TPZxuTzBU" ["related_video_title"]=> string(60) "License to Kill: Malware Hunting with the Sysinternals Tools" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> string(16) "Mark Russinovich" } [8]=> object(stdClass)#5052 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "TLPHmHPaCiQ" ["related_video_title"]=> string(42) "Where People Go When They Want to Hack You" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(9) "Cybernews" } [9]=> object(stdClass)#5070 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "p3vaaD9pn9I" ["related_video_title"]=> string(50) "Networking For Hackers! (Common Network Protocols)" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(10) "Hacker Joe" } }
Gone in 60 seconds: Crypto Attacks Leaving Victims High and Dry

Gone in 60 seconds: Crypto Attacks Leaving Victims High and Dry

The Truth about Ransomware: Its not Complicated!

The Truth about Ransomware: Its not Complicated!

Introduction To Advanced Persistent Threats (APTs)

Introduction To Advanced Persistent Threats (APTs)

LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated Ransomware

LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated Ransomware

APT Malware (advanced persistent threat)

APT Malware (advanced persistent threat)

DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor

Можно ли поменять родину так быстро? / вДудь

Можно ли поменять родину так быстро? / вДудь

License to Kill: Malware Hunting with the Sysinternals Tools

License to Kill: Malware Hunting with the Sysinternals Tools

Where People Go When They Want to Hack You

Where People Go When They Want to Hack You

Networking For Hackers! (Common Network Protocols)

Networking For Hackers! (Common Network Protocols)

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]