Global Remediation Lead IBM San Diego, California, United States
Checklist-driven approaches often prove insufficient in defending organizations against cyber threats. Cyberattacks are not linear. Instead, a threat actor can take numerous attack paths within a compromised environment and adjust their strategy to bypass security controls. As a result, to minimize the risk of a successful cyberattack, we need to understand threats and build cyber resiliency from the perspective of a threat actor.
In this talk, we will present a pragmatic methodology to building cyber resiliency from the perspective of a threat actor. The presenter developed this approach during countless breach investigations and remediation consulting engagements. Learn about a battlefield-tested strategy to minimize the risk of a successful cyberattack.
Learning Objectives:
Understand the concept of threat-centric cyber resiliency and why it is important in the age of prolific cybercrime.
Understand how a threat-centric approach can help identify security weaknesses and unknown risks.
Understand how identifying and reducing attack surface around common exploitation areas can enhance an organization's cyber resiliency.