6.6 Nation-State Attribution Part 2
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:03
if nation state actors are becoming more sophisticated,
00:08
enterprises needs toe up their game to the same level off sophistication
00:14
to proactively defend against these types of threats. The first step is to take another look at your organization from the aspect off information that would be most attractive to a nation state actor.
00:28
If your organization stores intellectual property
00:33
sensitive personal, legal or financial data with Judy PR in mind
00:39
or other consumer data,
00:42
you are ripe for a nation state threat. Certainly, consumer facing activities are a target rich opportunity for nation sponsored Attackers.
00:54
What security measures are the organization's taken to harden their defenses? In addition to patching vulnerabilities and implementing multi factor authentication,
01:04
every company must also educate their teams and enforce best practices.
01:11
Users should also be instructed toe, identify, social engineering attacks, fishing threats and other malicious activities. Otherwise, they will likely become a victim.
01:23
Constant vigilance and monitoring off all security processes in place is absolutely essential to defense for nation state threats
01:34
and for all threats that can compromise your organization's ability to do business.
01:38
Think about more frequent check ins with your security teams to obtain the most complete picture off both authorized on unauthorized activity.
01:49
This picture should include de visibility into your traffic patterns across the network to alert you to the Nile, off service threats
02:00
or the inside. Use low volume attacks like stress tests.
02:06
Besides the constant vigilance,
02:07
please be proactive. Introducing your attack surface
02:13
scrutinized your organization's workloads and when Internet access is not required easily those from the Internet.
02:22
This helps to reduce the exposure off critical data toe unauthorized access.
02:28
Also, use all the tools at your disposal to help
02:31
with vigilance
02:34
such as Patch and Vulnerability management application, Whitely Stink Privilege management, identity Management file and media protection and ransomware imitation.
02:46
Finally,
02:47
keep your friends close,
02:51
but your enemies closer.
02:53
It is a famous line from the Godfather films
02:57
and a good counsel for nation state defense on the Keep in France. Close site. Sharing What you have learned in the face off these threats with your friends and partners
03:08
helps the universe off colleagues working to defend against major attacks.
03:15
Which brings us to another subject that we will be discovering together in the next module.
03:22
In summary, state sponsored attacks are a highly rewarding and relatively low cost and low risk way to carry out eh? Spinach and military operations.
03:35
The likelihood off being ableto attribute attacks back to a particular country with sufficient trigger is extremely low,
03:45
and the success rate off any concerted effort is all. Mostly untie, reassured, and in this lesson we discover it. What are state sponsored attacks?
03:57
What are the methods that they are using? Their modest operandi, their motivations
04:03
and targets? And you finish it. This lesson with dips and recommendations on how to fight nation state actors.
04:13
This lesson waas The last video from the module attribution.
04:17
Our final stop off this course will be on dissemination and feedback.
04:25
The first video off the next module will be an introduction to define dissemination and feedback in the cyber threat intelligence context.
Up Next
Instructed By
Similar Content