Share Your Content with Us
on TradePub.com for readers like you. LEARN MORE
The Gaps APTs Exploit: Lessons from Real-World Attacks on Telecoms

Register for Your Free Webinar Now:

"The Gaps APTs Exploit: Lessons from Real-World Attacks on Telecoms"

Wednesday, June 11th, 2025 at 12pm EDT

This session compares real-world attack patterns against current federal guidance to uncover a critical insight: APT groups continue to succeed—not because defenders lack standards, but because those standards don’t address the attackers’ preferred path.
Fortunately, the research also points to an efficient way to detect and block APTs before they reach sensitive systems.

In this webinar, we’ll cover:

  • The most common methods and protocols exploited by state-sponsored attackers and other APT groups
  • An analysis of the 2024–2025 best practices for critical infrastructure from CISA, NIST, and the EPA
  • The most efficient and effective detection point and method to stop APT groups

Speakers:

Armita Satari, Head of Custom Content, Telecoms.com
As the Head of Custom Content, Armita leads the production of bespoke content on Telecoms.com Intelligence. Prior to joining the team, she held a number of roles at the GSMA, the mobile industry association, leading on strategic research and analytical output on mobile as an assistive technology and mobile networks and services. Before that, Armita was the primary industry Analyst specialising on the DACH region at Ovum (now Omdia), delivering business critical and intelligence research and consulting. She brings over a decade of analysis and research experience in the TMT sector.

Armita holds an MSc in Neuroscience, Language and Communication from University College London and a BA in Linguistics and English Studies from University of Brighton .

Dr. Ymir Vigfusson, professor of computer science at Emory University, and CTO of Keystrike, has analyzed how APT groups such as Typhoon have consistently exploited identity and access gaps across critical IT and OT systems leading to significant monetary and reputational damages. These breaches led to a dizzying array of new guidelines from federal agencies like NIST, CISA, and the EPA aimed at protecting US critical infrastructure from these emerging and dangerous threats.


Offered Free by: Keystrike
See All Resources from: Keystrike

Recommended for Professionals Like You: