ON-DEMAND WEBINAR:

How To Think Like A Threat Actor

Original Intel from Uptycs Threat Research

Worried about where the next attack is coming from? We’ve got your back.

One of the most important steps to preventing a cybersecurity breach is understanding your adversary.

The latest Uptycs threat research will help you get a leg up on the bad guys. Amit Malik and Ashwin Vamshi from Uptycs join Threatpost host Becky Bracken to walk through their latest research, explain what it means to organizations and answer specific questions from the audience.

In 30 minutes you'll learn:
 
  • Commonly abused commands and utilities in Linux, macOS and Windows

  • Malware families seen most prevalently seen across platforms

  • Active threat actors and recent targeted malware attacks

  • Important vulnerabilities to prioritize across platforms

  • Steps you can take to detect these actions and improve your security

Live Date: August 17, 2021

Watch On-Demand

Your pain? We understand. This is why we do what we do, and can provide you with an experience like no other.

 

Your pain? We understand. This is why we do what we do, and can provide you with an experience like no other.Your pain? We understand. This is why we do what we do, and can provide you with an experience like no other.

About our speakers

Amit Malik – Head of Threat Intel & Research

Amit is Head of Uptycs Threat Research Team. He has a specialization in threat detection, threat intelligence and security architecture. Prior to Uptycs, he has worked with leading cybersecurity companies like Mcafee, Fireeye and Netskope. He holds multiple patents in the area of threat detection and analysis. He actively contributes to security communities through blogs, trainings and tools.

Amit headshot circle purple

Ashwin Vamshi – Security Research Lead

Ashwin is a security researcher with an innate interest in APTs, targeted attacks and malware with high media attention. He has more than a decade of experience in areas related to antivirus, firewall, IDS/IPS, web categorization, sandbox, heuristic engines, threat intelligence, and cloud security. His research on cyber attacks and threats has been quoted in several infosec magazines and online media portals.

Ashwin headshot circle

Don't miss out on this live webinar!

© Uptycs. All rights reserved. Privacy Policy.