DLP FAIL!!! Using Encoding, Steganography, and Covert Channels to Evade DLP and Other Critical Controls
- Kevin Fiscus
- Monday, August 25th, 7:15pm - 8:15pm
It's all about the information! Two decades after the movie Sneakers, the quote remains as relevant, if not more so. The fact that someone hacks into an environment is interesting but not that relevant. What is important is what happens after the compromise. If the data is destroyed or modified, organizations are negatively impacted but the benefits to an attacker for destruction or alteration are somewhat limited. Stealing information however, is highly profitable. Identity theft, espionage, and financial attacks involve the exfiltration of sensitive data. As a result, organizations deploy tools to detect and/or stop that data exfiltration. While these tools can be extremely valuable, many have serious weaknesses; attackers can encode, hide, or obfuscate the data, or can use secret communication channels. This session will talk about and demonstrate a range of these methods.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
|General Session - Welcome to SANS||Paul A. Henry||Monday, August 18th, 8:15am - 8:45am||Special Events|
|Cloud IR & Forensics||Paul A. Henry||Monday, August 18th, 7:15pm - 9:15pm||Keynote|
|How to Build a Completely Hackable City in Five Steps (And Why You Should Build Your Own Skills in this Arena)||Ed Skoudis||Tuesday, August 19th, 7:15pm - 8:15pm||SANS@Night|
|Closing the Door on Web Shells||Anuj Soni||Tuesday, August 19th, 8:15pm - 9:15pm||SANS@Night|
|The 13 Absolute Truths of Security||Keith Palmgren||Wednesday, August 20th, 7:15pm - 8:15pm||SANS@Night|
|Security Architecture in the Enterprise Applying SABSA based Concepts to your Day Job||Don Murdoch||Wednesday, August 20th, 8:15pm - 9:15pm||SANS@Night|
|Debunking the Complex Password Myth||Keith Palmgren||Thursday, August 21st, 7:15pm - 8:15pm||SANS@Night|
|Privileged Domain Account Protection: How to Limit Credentials Exposure||Mike Pilkington||Friday, August 22nd, 7:15pm - 8:15pm||SANS@Night|
|General Session - Welcome to SANS||Rob Lee||Sunday, August 24th, 8:15am - 8:45am||Special Events|
|SIFT Workstation - The Art of Incident Response||Rob Lee||Sunday, August 24th, 7:15pm - 9:15pm||Keynote|
|DLP FAIL!!! Using Encoding, Steganography, and Covert Channels to Evade DLP and Other Critical Controls||Kevin Fiscus||Monday, August 25th, 7:15pm - 8:15pm||SANS@Night|
|Security Architecture in the Enterprise Applying SABSA based Concepts to your Day Job||Don Murdoch||Monday, August 25th, 8:15pm - 9:15pm||SANS@Night|
|Gone in 60 Minutes: Have You Patched Your System Today?||David Hoelzer||Tuesday, August 26th, 7:15pm - 8:15pm||SANS@Night|
|Investing for Retirement||Stephen Northcutt||Wednesday, August 27th, 8:15pm - 9:15pm||SANS@Night|