A Cyber Breach: Perspectives from an attacker and responder

Two Part Tech Talk | On-Demand Webinar

This two part Tech Talk webinar demonstrates and examines a practical cyber-attack observed from two perspectives: “The attacker” working to gain access to an organisations systems, and “The responder” working to investigate and remediate the attack. 


Part 1: A Hacker’s Viewpoint 

In Part 1 of this Tech Talk, attendees will be guided through a practical hack from the perspective of a malicious attacker. We will demonstrate common tactics, techniques and procedures (TTPs) used by attackers to infiltrate systems and networks, so you can be better prepared to defend against them.

In this session you will learn:

  • An understanding of the cyber kill chain from the perspective of a malicious attacker
  • View a practical demonstration of TTPs we are seeing attackers use to gain access into corporate environments 
  • High level overview of key indicators of compromise or “breadcrumbs” that malicious activities leave behind

Part 2: A Responder's Viewpoint

In Part 2 of this Tech Talk, we will focus on the attack from the responder’s perspective. We will discuss the incident handling process following the attack and how to leverage key forensic evidence left behind by the attacker to perform an investigation and prepare for remediation.

In this session you will learn:

  • An understanding of the incident handling process, following a cyber-attack
  • Some of the key evidence that may be left behind by an attacker and the importance of forensic preservation.
  • How forensic evidence can be used to scope and investigate an incident in preparation for remediation.


Theo Papadopoulos
‎Senior Security Consultant, Gotham Digital Science, a Stroz Friedberg company

Alex Campbell
Manager, Digital Forensics and Incident Response, Stroz Friedberg, an Aon company

Martin Hopkins (moderator)
Director, Stroz Friedberg, an Aon company