Get an 11 iPad Pro, Surface Pro, or $350 Off thru Dec 4 with OnDemand or vLive Training!

Webcasts

To attend this webcast, login to your SANS Account or create your Account.

Defending Against Fileless Malware

  • Wednesday, December 14th, 2016 at 1:00 PM EST (18:00:00 UTC)
  • Amit Serper and Matt Bromiley
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.

Sponsor

  • Cybereason

You can now attend the webcast using your mobile device!

Overview

Malware-free and fileless malware attacks are on the rise. Recent Cybereason research shows that almost a quarter of organizations worldwide were victims of fileless malware attacks in the past year.

In our upcoming webinar, Amit Serper, principal security researcher at Cybereason and Matt Bromiley, SANS Analyst, will explain the various mechanisms used by attackers and review effective approaches for detection and response.

Join our webinar to:

   -      Learn about fileless malware techniques, such as PowerShell and Windows Management Instrumentation (WMI)

   -      Find out why these attacks are hard to detect and mitigate

   -      Learn how Cybereason detects and responds to such attacks

Speaker Bios

Matt Bromiley

Matt Bromiley is a SANS digital forensics and incident response (IR) instructor, teaching FOR508 Advanced Incident Response, Threat Hunting, and Digital Forensics and SANS FOR572 Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response. He is also an IR consultant at a global IR and forensic analysis company, combining experience in digital forensics, log analytics, and incident response and management. His skills include disk, database, memory and network forensics; incident management; threat intelligence and network security monitoring. Matt has worked with organizations of all shapes and sizes, from multinational conglomerates to small, regional shops. He is passionate about learning, teaching and working on open source tools.


Amit Serper

Amit is the go-to person when out of the box thinking is needed to find vulnerabilities in complex infrastructure. Amit can spot the inherent vulnerabilities in embedded systems and is renowned for his shell popping abilities. He’s popped various embedded devices such as routers, IP cameras, even home irrigation systems. At Cybereason, Amit leads research on novel methodologies for identifying complex hacking operations that tend to evade common detection tools. Specifically, he researches large corporate networks, building methods to identify the attacker’s lateral movement from initially penetrating a single endpoint to spreading broadly to taking total control of the attacked.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.