<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
    <channel>
        <itunes:owner>
            <itunes:name>Kaspersky</itunes:name>
            <itunes:email>severine.blechet@kaspersky.fr</itunes:email>
        </itunes:owner>
        <title>Kaspersky</title>
        <link>https://video.kaspersky.fr</link>
        <description></description>
        <language>fr-fr</language>
        <generator>Visualplatform</generator>
        <docs>http://blogs.law.harvard.edu/tech/rss</docs>
        <itunes:author>Kaspersky</itunes:author>
        <itunes:type>episodic</itunes:type>
        <itunes:explicit>no</itunes:explicit>
        <itunes:image href="https://video.kaspersky.fr/files/rv1.4/sitelogo.gif"/>
        <image>
            <url>https://video.kaspersky.fr/files/rv1.4/sitelogo.gif</url>
            <title>Kaspersky</title>
            <link>https://video.kaspersky.fr</link>
        </image>
        <atom:link rel="self" href="https://video.kaspersky.fr/podcast/tag/threat attribution"/>
        <atom:link rel="next" href="https://video.kaspersky.fr/podcast/tag/threat attribution?tag=threat+attribution&amp;p=2&amp;podcast%5fp=t&amp;https="/>
        <item>
            <enclosure url="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/video_medium/the-power-of-threat-attribution-video.mp4?source=podcast" type="video/mp4" length="167864616"/>
            <title>The Power of Threat Attribution</title>
            <link>http://video.kaspersky.fr/the-power-of-threat-attribution</link>
            <description>&lt;p&gt;Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking.
&lt;p&gt;Vitaly Kamluk, Director of Global Research &amp;amp; Analysis Team, Kaspersky and Kirill Vorozhtsov, Solutions Architect, Kaspersky&lt;br&gt;
Attributing targeted attacks is a powerful and essential tool that:&lt;/p&gt;
&lt;p&gt;- Evaluates if you are a target or an unintended victim.&lt;br&gt;
- Provide insights into the actors behind the attack and their motivation.&lt;br&gt;
- Enables effective detection, investigation, containment and response based on the knowledge of the tactics, techniques and procedures specific to the threat actor&lt;/p&gt;
&lt;p&gt;Join our experts, Vitaly Kamluk and Kirill Vorozhtsov to learn how threat attribution can improve security operations and incident response, methodology and pitfalls of attributing threats. They will walk you through threat attribution examples with real-life APT malware samples and how it can be combined with other Threat Intelligence products to secure your business.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/the-power-of-threat-attribution"&gt;&lt;img src="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/standard/download-83-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</description>
            <guid>http://video.kaspersky.fr/photo/77638035</guid>
            <pubDate>Fri, 02 Sep 2022 14:25:04 GMT</pubDate>
            <media:title>The Power of Threat Attribution</media:title>
            <itunes:summary>Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking.
Vitaly Kamluk, Director of Global Research  Analysis Team, Kaspersky and Kirill Vorozhtsov, Solutions Architect, Kaspersky
Attributing targeted attacks is a powerful and essential tool that:
- Evaluates if you are a target or an unintended victim.
- Provide insights into the actors behind the attack and their motivation.
- Enables effective detection, investigation, containment and response based on the knowledge of the tactics, techniques and procedures specific to the threat actor
Join our experts, Vitaly Kamluk and Kirill Vorozhtsov to learn how threat attribution can improve security operations and incident response, methodology and pitfalls of attributing threats. They will walk you through threat attribution examples with real-life APT malware samples and how it can be combined with other Threat Intelligence products to secure your business.</itunes:summary>
            <itunes:subtitle>Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking.
Vitaly Kamluk, Director of Global Research  Analysis Team, Kaspersky and Kirill Vorozhtsov, Solutions Architect, Kaspersky...</itunes:subtitle>
            <itunes:author>Kaspersky</itunes:author>
            <itunes:duration>01:13:27</itunes:duration>
            <media:description type="html">&lt;p&gt;Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats is a massive undertaking.
&lt;p&gt;Vitaly Kamluk, Director of Global Research &amp;amp; Analysis Team, Kaspersky and Kirill Vorozhtsov, Solutions Architect, Kaspersky&lt;br&gt;
Attributing targeted attacks is a powerful and essential tool that:&lt;/p&gt;
&lt;p&gt;- Evaluates if you are a target or an unintended victim.&lt;br&gt;
- Provide insights into the actors behind the attack and their motivation.&lt;br&gt;
- Enables effective detection, investigation, containment and response based on the knowledge of the tactics, techniques and procedures specific to the threat actor&lt;/p&gt;
&lt;p&gt;Join our experts, Vitaly Kamluk and Kirill Vorozhtsov to learn how threat attribution can improve security operations and incident response, methodology and pitfalls of attributing threats. They will walk you through threat attribution examples with real-life APT malware samples and how it can be combined with other Threat Intelligence products to secure your business.&lt;/p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="http://video.kaspersky.fr/the-power-of-threat-attribution"&gt;&lt;img src="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/standard/download-83-thumbnail.jpg" width="75" height=""/&gt;&lt;/a&gt;&lt;/p&gt;</media:description>
            <media:content url="https://video.kaspersky.fr/v.ihtml/player.html?token=bc1112e6f6bee96dc008177f242484ef&amp;source=podcast&amp;photo%5fid=77638035" width="625" height="352" type="text/html" medium="video" duration="4407" isDefault="true" expression="full"/>
            <media:thumbnail url="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/standard/download-83-thumbnail.jpg" width="75" height=""/>
            <itunes:image href="http://video.kaspersky.fr/64968580/77638035/bc1112e6f6bee96dc008177f242484ef/standard/download-83-thumbnail.jpg/thumbnail.jpg"/>
            <category>attribution</category>
            <category>security</category>
            <category>threat attribution</category>
            <category>webinar</category>
        </item>
    </channel>
</rss>
