Incident & Breach Response , Managed Detection & Response (MDR) , Security Operations

Tracking 'Attacker Indicators'

Noam Jolles of Diskin Advanced Technologies on Attribution
Noam Jolles, senior intelligence specialist, Diskin Advanced Technologies

How can CISOs put "attacker indicators" to use in developing security defenses in a timely way? Noam Jolles of Diskin Advanced Technologies explains the importance of this aspect of attribution.

See Also: OnDemand | Realities of Choosing a Response Provider

"It's not about who the attacker is; it's about what would be his patterns, his behavioral patterns," she says.

In a video interview at Information Security Media Group's New York City Fraud and Breach Summit, Jolles, who was a featured speaker, also discusses:

  • The difference between indicators of compromise and indicators of attackers;
  • How attacker attribution helps with the timely development of security strategies;
  • How a single indicator can be predictive of future attacks.

Having almost two decades of experience in intelligence operations, training and designing of new approaches and methods, Jolles currently directs intelligence research and development at Diskin Advanced Technologies, a startup Israeli cybersecurity company.


About the Author

Joan Goodchild

Joan Goodchild

Director of Multimedia Content, ISMG

Joan Goodchild is veteran writer and editor who has been covering security for more than a decade. Before joining ISMG, she was the editor-in-chief of CSO, where she led the team to several national awards, including an AZBEE (ASPBE) for website of the year and several Digital Eddie (Folio) awards for B2B website of the year. Her previous experience in business journalism includes roles as a broadcast and web editor with the Boston Business Journal and as a news writer covering the Windows OS with TechTarget. Prior to that, she worked as a television reporter and anchor for more than a decade. She has a master's degree in journalism from Northwestern University's Medill School of Journalism and is the recipient of an Edward R. Murrow award for investigative reporting.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.