Key Learning Points
- Stealth techniques used to mask attacks.
- Breakdown of a modern attack based on research from Unit 42.
- Advances in mobile threats.
- Practical approaches for addressing risk.
Level: Intermediate
Cybersecurity has become a major focal point for businesses and governments around the world. In recent months, there have been a number of high profile breaches at major businesses and government agencies around the world. The techniques used in these attacks eluded the best practices in security due to underlying assumptions about what to look for. In many cases, the activities performed by the attacker were performed over time, and not discovered until after the damage was done.
In addition to the changing threat model, the changes in mobile computing and cloud infrastructure are also driving new requirements in what we need to secure.
In this session, learn about the latest findings on threat research from Unit 42, the threat research team from Palo Alto Networks, and get insights about how threats enter the victim’s network and persist undetected over time.
About Brian Tokuyoshi
Brian Tokuyoshi is a Senior Solutions Analyst for Palo Alto Networks, where he researches the mobility and wireless network security landscape. Brian has an extensive career in computer security, with domain expertise in encryption, data protection, and identity. Previously, Brian worked for PGP Corporation, Symantec and Control Data Systems, and served as senior market analyst for identity & cryptography at The Radicati Group.