6.6 Nation-State Attribution Part 2

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
4 hours 12 minutes
Difficulty
Advanced
CEU/CPE
5
Video Transcription
00:03
if nation state actors are becoming more sophisticated,
00:08
enterprises needs toe up their game to the same level off sophistication
00:14
to proactively defend against these types of threats. The first step is to take another look at your organization from the aspect off information that would be most attractive to a nation state actor.
00:28
If your organization stores intellectual property
00:33
sensitive personal, legal or financial data with Judy PR in mind
00:39
or other consumer data,
00:42
you are ripe for a nation state threat. Certainly, consumer facing activities are a target rich opportunity for nation sponsored Attackers.
00:54
What security measures are the organization's taken to harden their defenses? In addition to patching vulnerabilities and implementing multi factor authentication,
01:04
every company must also educate their teams and enforce best practices.
01:11
Users should also be instructed toe, identify, social engineering attacks, fishing threats and other malicious activities. Otherwise, they will likely become a victim.
01:23
Constant vigilance and monitoring off all security processes in place is absolutely essential to defense for nation state threats
01:34
and for all threats that can compromise your organization's ability to do business.
01:38
Think about more frequent check ins with your security teams to obtain the most complete picture off both authorized on unauthorized activity.
01:49
This picture should include de visibility into your traffic patterns across the network to alert you to the Nile, off service threats
02:00
or the inside. Use low volume attacks like stress tests.
02:06
Besides the constant vigilance,
02:07
please be proactive. Introducing your attack surface
02:13
scrutinized your organization's workloads and when Internet access is not required easily those from the Internet.
02:22
This helps to reduce the exposure off critical data toe unauthorized access.
02:28
Also, use all the tools at your disposal to help
02:31
with vigilance
02:34
such as Patch and Vulnerability management application, Whitely Stink Privilege management, identity Management file and media protection and ransomware imitation.
02:46
Finally,
02:47
keep your friends close,
02:51
but your enemies closer.
02:53
It is a famous line from the Godfather films
02:57
and a good counsel for nation state defense on the Keep in France. Close site. Sharing What you have learned in the face off these threats with your friends and partners
03:08
helps the universe off colleagues working to defend against major attacks.
03:15
Which brings us to another subject that we will be discovering together in the next module.
03:22
In summary, state sponsored attacks are a highly rewarding and relatively low cost and low risk way to carry out eh? Spinach and military operations.
03:35
The likelihood off being ableto attribute attacks back to a particular country with sufficient trigger is extremely low,
03:45
and the success rate off any concerted effort is all. Mostly untie, reassured, and in this lesson we discover it. What are state sponsored attacks?
03:57
What are the methods that they are using? Their modest operandi, their motivations
04:03
and targets? And you finish it. This lesson with dips and recommendations on how to fight nation state actors.
04:13
This lesson waas The last video from the module attribution.
04:17
Our final stop off this course will be on dissemination and feedback.
04:25
The first video off the next module will be an introduction to define dissemination and feedback in the cyber threat intelligence context.
Up Next
Advanced Cyber Threat Intelligence

Advanced Cyber Threat Intelligence will benefit security practitioners interested in preventing cyber threats. Learn how to leverage your existing data sources to extract useful information and find complementary information from external sources.

Instructed By