Wednesday, June 11th, 2025 at 12pm EDT
This session compares real-world attack patterns against current federal guidance to uncover a critical insight: APT groups continue to succeed—not because defenders lack standards, but because those standards don’t address the attackers’ preferred path.
Fortunately, the research also points to an efficient way to detect and block APTs before they reach sensitive systems.
In this webinar, we’ll cover:
Speakers:
Armita Satari, Head of Custom Content, Telecoms.com
As the Head of Custom Content, Armita leads the production of bespoke content on Telecoms.com Intelligence. Prior to joining the team, she held a number of roles at the GSMA, the mobile industry association, leading on strategic research and analytical output on mobile as an assistive technology and mobile networks and services. Before that, Armita was the primary industry Analyst specialising on the DACH region at Ovum (now Omdia), delivering business critical and intelligence research and consulting. She brings over a decade of analysis and research experience in the TMT sector.
Armita holds an MSc in Neuroscience, Language and Communication from University College London and a BA in Linguistics and English Studies from University of Brighton .
Dr. Ymir Vigfusson, professor of computer science at Emory University, and CTO of Keystrike, has analyzed how APT groups such as Typhoon have consistently exploited identity and access gaps across critical IT and OT systems leading to significant monetary and reputational damages. These breaches led to a dizzying array of new guidelines from federal agencies like NIST, CISA, and the EPA aimed at protecting US critical infrastructure from these emerging and dangerous threats.
Offered Free by: Keystrike
See All Resources from: Keystrike