21.11.2015 Views

dissection of a Cyber- Espionage attack

cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attack

cct-w08_evolving-threats-dissection-of-a-cyber-espionage-attack

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Zero Trust<br />

Below zero trust…<br />

Following our advice to bring a network forensic tool in their environment (RSA<br />

Security Analytics) we have been able to ensure that, even after the «apparent»<br />

expulsion <strong>of</strong> the <strong>attack</strong>er, several machines were still infected.<br />

#RSAC<br />

Successful<br />

communication<br />

recorded after<br />

expulsion/triage…<br />

The «network<br />

visibility» has<br />

<strong>of</strong>fered also<br />

the chance to<br />

proactively<br />

monitor the<br />

occurrence <strong>of</strong><br />

other malicious<br />

<strong>attack</strong>s.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!