When Macs Get Hacked
- Sarah Edwards
- Tuesday, February 24th, 8:15pm - 9:15pm
Computer intrusion cases usually consist of Windows or *nix systems, if you are lucky. Mac intrusion cases are a rare breed. These cases have the potential to become more popular with the growing market share of Macintosh systems. Many companies and government entities use Macs as their preferred system. This presentation and hands-on lab will introduce you to incident response and intrusion analysis of the Mac.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
|General Session - Welcome to SANS||Rob Lee||Monday, February 23rd, 8:15am - 8:45am||Special Events|
|DFIReception - Forensicators Unite!||—||Monday, February 23rd, 6:00pm - 7:00pm||Reception|
|Rapid Response and Data Collection -- Triaging for The Real World||Rob Lee||Monday, February 23rd, 7:15pm - 9:15pm||Keynote|
|Network Forensics: The Final Frontier (Until the Next One)||Philip Hagen||Tuesday, February 24th, 7:15pm - 8:15pm||SANS@Night|
|When Macs Get Hacked||Sarah Edwards||Tuesday, February 24th, 8:15pm - 9:15pm||SANS@Night|
|Women in Technology Meet and Greet||—||Wednesday, February 25th, 6:00pm - 7:00pm||Reception|
|Preparing for PowerShellmageddon â Investigating Windows Command Line Activity||Chad Tilbury||Wednesday, February 25th, 7:15pm - 8:15pm||SANS@Night|
|Power-up Your Malware Analysis with Forensics||Anuj Soni||Wednesday, February 25th, 8:15pm - 9:15pm||SANS@Night|