Live Webinar: APT Group Attack Method Commonalities Against Critical Infrastructure

Watch Now (On-Demand) at: www.cip-association.org/APT-attack-webinar

Join us for a data-driven webinar on how state and non-state sponsored groups are using Advanced Persistent Threat (APT) tactics to successfully breach critical infrastructure—and the most efficient ways to stop them.

Dr. Ymir Vigfusson, professor of computer science at Emory University, and CTO of Keystrike, has analyzed how APT groups such as Typhoon have consistently exploited identity and access gaps across critical IT and OT systems leading to significant monetary and reputational damages. These breaches led to a dizzying array of new guidelines from federal agencies like NIST, CISA, and the EPA aimed at protecting US critical infrastructure from these emerging and dangerous threats.

This session compares real-world attack patterns against current federal guidance to uncover a critical insight: APT groups continue to succeed—not because defenders lack standards, but because those standards don’t address the attackers’ preferred path.

Fortunately, the research also points to an efficient way to detect and block APTs before they reach sensitive systems.

In this webinar, we’ll cover:
• The most common methods and protocols exploited by state-sponsored attackers and other APT groups
• An analysis of the 2024–2025 best practices for critical infrastructure from CISA, NIST, and the EPA
• The most efficient and effective detection point and method to stop APT groups

Watch Now (On-Demand) at: www.cip-association.org/APT-attack-webinar


About the Speaker:

Ymir Vigfusson is the CTO and co-founder of Keystrike, a growing cybersecurity company that emerged from his research as Associate Professor at Emory University, with a PhD in Computer Science from Cornell.

A reformed hacker making amends, a mathematician disguised as a computer scientist, a builder of systems and companies, a public speaker and educator, a private pilot and a pianist, a culturally curious Icelander, and an exoskeleton for 4 little viklings.

Ymir has been involved in a number of research projects, which are listed in his curriculum vitae and publications. His academic research has been gratefully supported by the NSF, CDC, RANNIS, and other funding from industry.

Before starting Keystrike in 2023 (video on the right), he co-founded the penetration testing company Syndis (acquired in 2021) and the cybersecurity education company Adversary (acquired in 2020).

Ymir has had the fortune of spending time with some remarkable people, and has enjoyed passing what he has learned on to his students and various audiences.