![Page 1: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/1.jpg)
APTs: Filtering Out the Marketing Hype to See the Real Threat
![Page 2: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/2.jpg)
IT SECURITY & COMPLIANCE AUTOMATION
Today’s Speakers
Matt Olney
Senior Research Engineer
Sourcefire
Tim Zonca
Product Marketing Manager for Tripwire Log Center
Tripwire, Inc.
![Page 3: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/3.jpg)
Matthew OlneySenior Research EngineerSourcefire’s Vulnerability Research TeamTwitter: @kpyke
“APT: There are people smarter than you, they have more resources than you, and they are coming for you. Good luck with that."
![Page 4: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/4.jpg)
It is no longer enough to simply out-run everyone else. You are on your own versus an adversary you’ll never see.
![Page 5: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/5.jpg)
AssignmentGather
Intelligence
Select Targets
Profile Targets
Execute Attacks
Establish Foothold
(C2)
ExtractData
Continue gathering data within the organization
![Page 6: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/6.jpg)
The attacker holds a major information advantage
…but that makes the small advantages we do have that much more important.
![Page 7: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/7.jpg)
7
![Page 8: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/8.jpg)
![Page 9: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/9.jpg)
9
Different demands an explanation
![Page 10: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/10.jpg)
Real-Time vs. Near-Real Time
![Page 11: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/11.jpg)
Q&A
Matthew OlneySenior Research EngineerSourcefire’s Vulnerability Research TeamTwitter: @kpyke
![Page 12: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/12.jpg)
Two roads diverged in a yellow wood……and unfortunately, you must travel
both.
![Page 13: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/13.jpg)
The Reality of Defense
Not you
![Page 14: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/14.jpg)
The Reality of Defense Scales
Definitely not you
![Page 15: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/15.jpg)
The Bad Guys
![Page 16: APTs: Filtering Out the Marketing Hype to See the Real Threat](https://reader036.vdocuments.site/reader036/viewer/2022062418/556576c8d8b42a7b518b52e5/html5/thumbnails/16.jpg)
IT SECURITY & COMPLIANCE AUTOMATION
Answers For Your Questions