Wednesday, April 9, 2014 5 years ago -
MWR invites you to attend our APT briefing to inform and update you on the current and developing threats organizations are faced with. We will look at the historic reasons behind APT and the motivations of threat actors – examine how specific sectors within the UK are being and will be targeted and understand how the most advanced companies are structuring their defence programmes.
Presentations will include:
Geo-political positions of the main threat actors
One of the principle difficulties in understanding the likelihood of attack (coupling the impact with the true risk) is understanding the motivations behind why your organisation would be targeted.
In this presentation MWR will run through the current geo-political motivations of the key threat actors, why the differing scenario options will alter their cyber behaviour and how this should be used by businesses to update and inform their APT programmes to ensure the best chance of defence.
Cyber capability of the main threat actors – typical attacks
This presentation will detail the cyber structure and recourses of the main threat actors. It will provide information as to why they have adopted their current position, as well as some attack examples and broad methods.
Necessary defence programmes for CNA and CNE mitigation
This key presentation gives an overview of the core principles needed to defend against both CNE and CNA attacks. Importantly it will look at why most of the current solutions fail to defend adequately unless implemented with a clear understanding of attack methods.
This presentation uses multiple examples from current defence programmes to underline the substantial method and structure required to correctly align the layers of controls, to mitigate the true risk posed by sophisticated threat actors.
Use of advanced toolsets to aid CNE and CNA detection (Deteqt)
As part of the requirement to undertake assessments for clients, MWR has developed a highly specialised tool to allow audit and detection of advanced threat actors.
During this presentation we will detail its function, how it can be used and how it should be used to conduct assessments, both prior to the start of a defensive programme and once monitoring is required as part of the programme.
Phish’d – How you can protect your organisation against Phishing Attacks (Manchester Only)
Phishing is a key entry vector for many APT attacks. During this presentation MWR will demonstrate the custom platform built and designed to test organisations phishing defences and user awareness. Phish’d specifically allows phishing campaigns to be simulated, user behaviour tracked and key failings in user awareness to be measured and improved over a period of time.