How do the threat hunting team and the Cyber Threat Intelligence (CTI) team collaborate in real time during a ransomware attack? What are the key points that need to be investigated and what process is taken to obtain answers quickly when time is short?
In this session, we’ll look at how these two expert teams at CyberProof worked together in a recent ransomware incident to quickly get to the root of questions such as: What was the initial attack vector used? Was the exfiltration accomplished? Do the threat actors still have access to the network? Learn more in this session by CyberProof’s Asaf Haski, Senior Cyber Threat Intelligence Analyst, and Karina Daniel, Cyber Threat Hunter.