Title: New TTPs for Tracking Attacker Infrastructure
Abstract: There are a range of Tactics, Techniques and Procedures that involve how an attacker manages their campaign infrastructure. These are critical points of reference for tracking attackers as they set up new campaigns. Silent Push shared some of these new attributes, what they mean, and how companies can use them to search for campaigns targeting them.
Speaker: Ken Bagnall, CEO Silent Push Inc.
Speaker Bio: Silent Push is a threat enrichment and hunting platform that allows organizations to have customized feeds relevant to themselves.
Ken has a long track record of defending companies from attack. Previously Ken was Vice President of FireEye product management. In FireEye he led a team that defended the world’s largest organizations from advanced threat actor groups. Ken also founded The Email Laundry in 2007 which was acquired by FireEye in 2017. The Email Laundry kept email safe for over 9000 organizations worldwide primarily through their email security service. The service specialized in impersonation detection and creating email specific threat intelligence tools. The service was the highest rated Secure Email Gateway on Gartner Peer Insights. The full technology stack is ported in to FireEye Email Security cloud service. Ken also has a Cybersecurity Investment company called Phish Security that funds innovation in this sector. He sits on the advisory board of Strike Ready, a security operations platform. Ken was previously also on the board of Information Security Ireland, on the executive council of CompTIA UK, and on the executive council of the EU PROTECTIVE threat intelligence project.