How to Hunt for Volt Typhoon Malware in Critical Infrastructure

The federal government has strenuously and repeatedly stated that critical infrastructure providers must be proactive in hunting for malware that may be present in networks, focusing specifically on CCP-sponsored Volt Typhoon Adversary.

 

Attendees joined critical infrastructure experts for a panel discussion on how to hunt for Volt Typhoon. 

 

Discussion topics included:

  • How Four18 Intelligence uses UnknownCyber ThreatHunter to hunt for Volt Typhoon and other malware
  • How Global Data Systems deploys UnknownCyber ThreatHunter inside a major metropolitan water provider to hunt for Volt Typhoon and other malware
  • How semantic analysis provides early warning of and predictive countermeasures to protect against future attacks using UnknownCyber’s database of 1.8+ billion de-obfuscated functions
  • How UnknownCyber detects and prevents future threats that can impact critical infrastructure

Learn how your organization can detect, attribute, and eradicate Volt Typhoon threats with the help of UnknownCyber.

Speaker Details

James Hess, CEO, UnknownCyber

 

Mark Jaster, CEO, 418 Intelligence

 

Bob Miller, COO, Global Data Systems

 

Bill Placke, Board Member, UnknownCyber

Event Topic

Big Data, Data Center / Infrastructure

Relevant Audiences

All State and Local Government, All Federal Government

Other Agency

Other Federal Agencies
How to Hunt for Volt Typhoon Malware in Critical Infrastructure
Event Type
On-Demand
Event Subtype
Webinar / Webcast
Registration Cost
Complimentary
Website
Click here to view event website
Organizers
Carahsoft Technology Corp.