Cyber threat adversary infrastructure refers to the combination of assets that cybercriminals and malicious actors use to execute their nefarious activities – servers, domains, IP addresses, and other digital elements.
Every attack today, regardless of how it breaches the enterprise, needs to communicate with adversary infrastructure or command-and-control (C2) for instructions as part of lateral motion, privilege escalation, data exfiltration, and even encryption.
Guest Speaker: David Ratner, HYAS CEO
After obtaining his Ph.D. in Computer Science, David Ratner has spent his career in various areas of software and technology, from writing code to scaling and growing venture-backed, private-equity owned, and public companies. Currently he serves as the CEO of HYAS and leads both the long-term vision and the day-to-day mission to bring game-changing solutions to HYAS clients around the world.