Hunting a Ghost: On the Trail of an Elusive Adversary

Thursday, April 12 | 2:20PM–3:20PM ET | Maryland Ballroom E, Fifth Floor
Session Type: Breakout Session
Delivery Format: Interactive Presentation
"URGENT. Please call me on the cell at your earliest convenience." This text message to the University of Hawaii CISO launched an extensive investigation into a highly targeted attack on the UH network. This session will replay the details of the investigation as it unfolded and walk through specific tactics, techniques, and procedures (TTPs) used by a highly skilled adversary to gain a foothold into a UH research network. Lessons learned and remediation efforts to detect the return of the attackers will also be addressed.

Outcomes: Understand more about advanced persistent threats and see a timeline of the attacker's activities * Be able to articulate the threat to your institution and promote and promulgate security tactics and practices to better secure your institution * Engage in discussions on remediation strategies and identification tools and techniques to flag similar attacks and share your experiences with APTs


  • Jodi Ito

    CISO, University of Hawaii System Office

Resources & Downloads

  • HuntingaGhostslidesfinal

    2 MB, pdf - Updated on 10/25/2018