Primary Logo - Digital (RGB)-3

ON-DEMAND WEBINAR

Attack Lifecycle:    How Attackers Harvest Credentials & Gain Initial Access

Credential harvesting and gaining initial access are two important pieces in the initial phases of the cyber attack lifecycle; attackers can’t have one without the other and utilize various tactics and techniques when starting an attack.

To see this for yourself, listen to this on-demand session with threat intelligence analysts from Recorded Future’s research arm — the Insikt Group — who expose the phases of the cyber attack lifecycle through the eyes of the attacker.

You will leave this on-demand webinar with: 

  • An understanding of the cyber attack lifecycle
  • Real-world examples of how attackers get credentials and gain initial access
  • A detailed look into Insikt Group exclusive research and reports on credential harvesting and detections for attacker’s favorite web shells

Featured Speakers

LindsayKaye-1

LINDSAY KAYE

Director of Operational Outcomes for Insikt Group, Recorded Future

Lindsay Kaye is the Director of Operational Outcomes for Insikt Group at Recorded Future. Her primary focus is driving the creation of actionable technical intelligence - providing endpoint, network and other detections that can be used to detect technical threats to organizational systems.  Lindsay’s technical specialty and passion is malware analysis and reverse engineering.

image-Jan-04-2022-04-17-19-92-PM

JOHN TERBUSH

Sr. Threat Intelligence Researcher for Insikt Group, Recorded Future

John TerBush is a senior threat intelligence researcher with the Insikt Group at Recorded Future. He helps the team track the infrastructure, malware and tactics of state and cybercriminal entities. John has previously worked as a security operations center analyst and a private investigator. John assisted with the development of the SANS Institute’s SEC487 Fundamental OSINT course, is a co-author of the new SEC587 Advanced OSINT course, and is on the board of advisors of the SANS Open Source Intelligence Summit. 

Picture3

JUSTIN GROSFELT

Threat Intelligence Analyst for Insikt Group, Recorded Future

Justin Grosfelt is a threat intelligence researcher with the Insikt Group at Recorded Future. He focuses on creating methodologies for researching emerging malware, threat discovery, and tracking adversary infrastructure.

image (1)-1

JAKE MUNROE

Product Marketing Manager, Threat Intelligence & Geopolitical Intelligence

Jake Munroe is a senior product marketing manager at Recorded Future and has held various roles across the security space in consulting, marketing, and sales. Prior to joining the private sector, he served as a Navy Intelligence Analyst with an extensive background in counterterrorism, cyber threat intelligence, and open-source intelligence investigations.