Anatomy of a Nation-State Attack

  • Date 15th November 2018 (Thursday)

Anatomy of a Nation-State Attack

15 Nov 2018, 12:35 - 13:00

Tech Talks

Ever wanted to learn how advanced attackers gain foothold within an organization’s network? Learn their tactics, techniques and procedures (TTPs) on a real-life example of a recent suspected nation-state attack. From supply chain attack to file-less malware, from off-the-shelf  dual-purpose utilities to crafted malware turning Google Drive into a command and control (C&C) server. Leave this presentation armed with technical details of how sophisticated attackers operate along with knowledge that can help you improve your organization’s security posture.

Learning Outcomes:

  1. Learn about supply chain attacks
  2. Learn about file-less malware and “living off the land” tools and techniques employed by malicious actors
  3. Discuss the question of attack attribution
  4. Understand the anatomy of a nation-state attack based on a real-world example
  5. Explore best practices for keeping advanced attackers out




  • Rene Kolga


    Sr. Director of Product Management


    Rene Kolga, CISSP, has over 10 years of cybersecurity experience in the areas of endpoint protection, insider threat, encryption and patch...

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.