Events , Next-Generation Technologies & Secure Development , RSA Conference

Threat Hunting Report: Beyond Supply Chain Attacks

Symantec's Eric Chien on Attack Trends and the Promise of Security Innovation
Eric Chien, Fellow, Symantec Division of Broadcom

As technical director of the Attack Investigations Team at Symantec, a division of Broadcom, Eric Chien has access to intelligence and telemetry on the latest attack trends. He shares insights on supply chain attacks and more - and discusses how defenders can raise their game in response.

In a video interview with Information Security Media Group as part of ISMG’s RSA Conference 2021 coverage, Chien discusses:

  • The most concerning attack trends;
  • How to respond to attack quantity and innovation;
  • Ways in which defenders can raise their games and improve defenses.

Chien is a Fellow of Security Technology and Response at Symantec, a division of Broadcom. He leads a team of engineers and threat hunters who investigate and reverse-engineer the latest high-impact internet security attacks – those that might hold clues to bigger trends developing or are otherwise of particular interest. Via these attack techniques and trends, he develops and drives threat intelligence and novel security solutions to prevent and mitigate against the next big attack. Chien was one of the lead authors of Symantec’s groundbreaking research on the revolutionary Stuxnet malware, and he has become one of the security industry’s foremost authorities on this threat.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.