How to Hunt for Volt Typhoon Malware in Critical Infrastructure
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary.
Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon.
Discussion topics included:
- How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and other malware
- How Global Data Systems deploys UnknownCyber ThreatHunter inside a major metropolitan water provider to hunt for Volt Typhoon and other malware
- How semantic analysis provides early warning of and predictive countermeasures to protect against future attacks using UnknownCyber’s database of 1.8+ billion de-obfuscated functions
- How UnknownCyber detects and prevents future threats that can impact critical infrastructure
Learn how your organization can detect, attribute, and eradicate Volt Typhoon threats with the help of UnknownCyber.
Speaker Details
James Hess, CEO, UnknownCyber
Mark Jaster, CEO, 418 Intelligence
Bob Miller, COO, Global Data Systems
Bill Placke, Board Member, UnknownCyber
Event Topic
Big Data, Data Center / InfrastructureRelevant Audiences
All State and Local Government, All Federal GovernmentOther Agency
Other Federal Agencies
Event Type
On-Demand
Event Subtype
Webinar / Webcast
Registration Cost
Complimentary