InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Responding to Ransomware: How to Leverage Threat Intelligence and Threat Hunting

Presented by

Asaf Haski, Senior Cyber Threat Intelligence (CTI) Analyst, CyberProof & Karina Daniel, Cyber Threat Hunter, CyberProof

About this talk

How do the threat hunting team and the Cyber Threat Intelligence (CTI) team collaborate in real time during a ransomware attack? What are the key points that need to be investigated and what process is taken to obtain answers quickly when time is short? In this session, we’ll look at how these two expert teams at CyberProof worked together in a recent ransomware incident to quickly get to the root of questions such as: What was the initial attack vector used? Was the exfiltration accomplished? Do the threat actors still have access to the network? Learn more in this session by CyberProof’s Asaf Haski, Senior Cyber Threat Intelligence Analyst, and Karina Daniel, Cyber Threat Hunter.
CyberProof

CyberProof

7767 subscribers73 talks
Better Security, Together
CyberProof delivers better security operations and drives superior experiences for enterprise customers. Our cloud-first, AI-powered approach to security, delivers industry-leading security services to drive real business results. We believe that working closely with our customers and partners through a better security, together services model, jointly empowers us to defend against the greatest of threats.
Related topics