![Colin Sheppard Colin Sheppard](https://media-cdn.kroll.com/jssmedia/kroll-images/headshots/colin-sheppard.png?h=160&iar=0&w=140&mw=384)
Kroll’s Head of Threat Intelligence in EMEA, George Glass, presents: “TODDLERSHARK Malware Analysis: How Kimsuky Weaponized the ScreenConnect Vulnerability” hosted at the Talking Tactics stage on Wednesday 5th June from 2:15 p.m. to 2:45 p.m. (BST).
Threat intelligence fueled by frontline incident response intel and elite analysts can provide a rich insight into threat actor activity. Security leaders need access to this frontline incident intelligence to understand if they are likely to be in a similar situation but also take immediate action on their defenses. In this session, George will highlight how the malware was deployed as part of an attempted compromise, then detected and stopped by the Kroll Responder team.
Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.
Threat intelligence are fueled by frontline incident response intel and elite analysts to effectively hunt and respond to threats.
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.
Proactively identify your highest-risk exposures and address key gaps in your security posture. As the No. 1 Incident Response provider, Kroll leverages frontline intelligence from 3000+ IR cases a year with adversary intel from deep and dark web sources to discover unknown exposures and validate defenses.
Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.
Validate your cyber defenses against real-world threats. Kroll’s world-class penetration testing services bring together front-line threat intelligence, thousands of hours of cyber security assessments completed each year and a team of certified cyber experts — the foundation for our sophisticated and scalable approach.