North Korea’s (DPRK) cyber operations have rapidly evolved, shifting from traditional cyberattacks to a blended approach that combines nation-state tactics with insider threats to evade detection. As public indicators became more widely recognized, DPRK adapted—leveraging stolen identities, freelancer networks, and supply chain vulnerabilities to infiltrate organizations at scale.
In this webinar, Benjamin Read, Senior Manager, Google Threat Intelligence Group, Raj Koo, CTO, DTEX, Rob Schuett, Director of Insider Intelligence and Investigations, DTEX, and John Mendoza, Executive Director, US Insider Risk Management Center of Excellence, reveal how to spot and stop these emerging threats, including:
- Advanced Evasion Techniques: How DPRK uses virtual desktop infrastructure (VDI), laptop farms, and identity obfuscation to stay hidden.
- Insider Vulnerabilities: How evolving tactics—such as outsourced IT and emerging technologies—create pivot points that expose broader espionage efforts.
- Real-World Attack Scenarios: True stories of witting and unwitting insiders enabling fraud, sabotage, and data theft.
- Actionable IOCs & Analytics: Key indicators and behavioral patterns to help detect insider-driven attacks before they escalate.
- Safe Disruption Strategies: Approaches to removing embedded threats without sparking costly retaliation or extortion.
Watch the on-demand webinar to gain the intelligence and hands-on strategies needed to stay ahead of one of today’s most sophisticated insider threats.