How to Hunt for Volt Typhoon Malware in Critical Infrastructure

The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary.


Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. 


Discussion topics included:

  • How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and other malware
  • How Global Data Systems deploys UnknownCyber ThreatHunter inside a major metropolitan water provider to hunt for Volt Typhoon and other malware
  • How semantic analysis provides early warning of and predictive countermeasures to protect against future attacks using UnknownCyber’s database of 1.8+ billion de-obfuscated functions
  • How UnknownCyber detects and prevents future threats that can impact critical infrastructure

Learn how your organization can detect, attribute, and eradicate Volt Typhoon threats with the help of UnknownCyber.

Speaker and Presenter Information

James Hess, CEO, UnknownCyber


Mark Jaster, CEO, 418 Intelligence


Bob Miller, COO, Global Data Systems


Bill Placke, Board Member, UnknownCyber

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government



Event Type
On-Demand Webcast

This event has no exhibitor/sponsor opportunities

Complimentary:    $ 0.00

Click here to visit event website

Event Sponsors


UnknownCyber Government Team at Carahsoft

Contact Event Organizer

Return to search results