Associate Vice President - Security Analytics, Antuit, Inc.
Result-oriented CISSP with versatile experience in the cybersecurity domain. Solving information security problems with data science tools.
All Sessions by Sumit Janmejai
Threat Intelligence, Malware Analysis, Cyber Attribution Enabler: AI
11:15 - 12:00
1. Threat actor and their TTPs - ATT&CK Mitre
2. Cyber attribution intro
3. Possible ways of cyber attribution - Infra reuse, code reuse and others
4. AI approach to malware analysis - pragmatically analysing thousands of malware samples to glean patterns
5. Infra Reuse - Network Graphs for correlation and campaign analysis
6. Code Reuse - API calls, function, binary code overlap etc.
7. Deception and misattribution
8. Real world scenarios and cases from recent work