|Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
Information technology is vulnerable and the Internet is international. Politicians, spies and hackers use malware to steal votes and influence foreign elections. This research correlates two years of malware detected in countries holding national elections. It encompasses thousands of malware families and dozens of elections, using timelines, geolocation and interviews with country-level CERTs.
1: Learn how to incorporate strategic traffic analysis into malware research and detection.
2: Understand why you should correlate major geopolitical events (including elections) with your log files.
3: Resolve to find and defeat nation-state actors on your network.
Malware, network security, national security, elections, critical infrastructure, international relations.