Yet Another Breach

January, 2017

This whitepaper is based on F-Secure’s experience of conducting targeted attack simulations – and of the defense teams that have failed to stop them.

We consider how and why the many security controls typically in place at large enterprises fail to prevent or detect such attacks; and we go on to describe security controls and detection methodologies that would have been effective at each stage.

This document should be of use to the following industry professionals:

    who need to understand the nature of a modern targeted attack in order to ask the right questions of their security teams.
  • Technical cyber defense staff
    aiming to understand the tactics typically used by modern threat actors and whether the controls they have in place would be effective against these attacks.
  • In-house IR teams
    aiming to assess whether the data sources and technologies they have in place would allow an effective investigation and response exercise in the face of such an attack.
Accreditations & Certificates

F-Secure Consulting (F-Secure Cyber Security (Pty) Ltd) is a level 4 contributor to B-BBEE with a procurement recognition level of 100%. Learn more and download our B-BBEE certificate. Click here to read the press release.

Follow us
@fsecure_consult F-Secure-Consulting f-secure-foundry fsecurelabs