How to Hunt for Volt Typhoon Malware in Critical Infrastructure



The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary.

 

Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. 

 

Discussion topics included:

  • How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and other malware
  • How Global Data Systems deploys UnknownCyber ThreatHunter inside a major metropolitan water provider to hunt for Volt Typhoon and other malware
  • How semantic analysis provides early warning of and predictive countermeasures to protect against future attacks using UnknownCyber’s database of 1.8+ billion de-obfuscated functions
  • How UnknownCyber detects and prevents future threats that can impact critical infrastructure

Learn how your organization can detect, attribute, and eradicate Volt Typhoon threats with the help of UnknownCyber.

Speaker and Presenter Information

James Hess, CEO, UnknownCyber

 

Mark Jaster, CEO, 418 Intelligence

 

Bob Miller, COO, Global Data Systems

 

Bill Placke, Board Member, UnknownCyber

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Register


Register


Event Type
On-Demand Webcast


This event has no exhibitor/sponsor opportunities


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors

UnknownCyber


Organizer
UnknownCyber Government Team at Carahsoft


Contact Event Organizer



Return to search results