Dean highlights the basic to intermediate approaches for malware analysis for IT and ICS environments. Four methodologies are reviewed. The focus is on quick triage to scope cyber incidents and gathering indicators of compromise (IOCs) for practical defense.
The talk is geared towards new or existing organizations looking to augment their defenses by gleaning actionable intelligence from the adversary's Malware. whether you deploy a fully automated system or just have one keen employee empowered to hunt for evil - a small investment