How to Hunt for Volt Typhoon Malware in Critical Infrastructure
The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary.
Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon.
Discussion topics included:
- How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and other malware
- How Global Data Systems deploys UnknownCyber ThreatHunter inside a major metropolitan water provider to hunt for Volt Typhoon and other malware
- How semantic analysis provides early warning of and predictive countermeasures to protect against future attacks using UnknownCyber’s database of 1.8+ billion de-obfuscated functions
- How UnknownCyber detects and prevents future threats that can impact critical infrastructure
Learn how your organization can detect, attribute, and eradicate Volt Typhoon threats with the help of UnknownCyber.
Speaker and Presenter Information
James Hess, CEO, UnknownCyber
Mark Jaster, CEO, 418 Intelligence
Bob Miller, COO, Global Data Systems
Bill Placke, Board Member, UnknownCyber
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
On-Demand Webcast
This event has no exhibitor/sponsor opportunities
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
UnknownCyber Government Team at Carahsoft