Special Offer w/ OnDemand: Get an iPad (32 G), Galaxy Tab A, or Take $250 Off OnDemand Training thru Jan 27


To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.

Defending Against Fileless Malware

  • Wednesday, December 14, 2016 at 1:00 PM EST (2016-12-14 18:00:00 UTC)
  • Amit Serper, Matt Bromiley


  • Cybereason

You can now attend the webcast using your mobile device!



Malware-free and fileless malware attacks are on the rise. Recent Cybereason research shows that almost a quarter of organizations worldwide were victims of fileless malware attacks in the past year.

In our upcoming webinar, Amit Serper, principal security researcher at Cybereason and Matt Bromiley, SANS Analyst, will explain the various mechanisms used by attackers and review effective approaches for detection and response.

Join our webinar to:

   -      Learn about fileless malware techniques, such as PowerShell and Windows Management Instrumentation (WMI)

   -      Find out why these attacks are hard to detect and mitigate

   -      Learn how Cybereason detects and responds to such attacks

Speaker Bios

Matt Bromiley

Matt Bromiley is a SANS digital forensics and incident response (IR) instructor, teaching FOR508 Advanced Incident Response, Threat Hunting, and Digital Forensics and SANS FOR572 Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response. He is also an IR consultant at a global IR and forensic analysis company, combining experience in digital forensics, log analytics, and incident response and management. His skills include disk, database, memory and network forensics; incident management; threat intelligence and network security monitoring. Matt has worked with organizations of all shapes and sizes, from multinational conglomerates to small, regional shops. He is passionate about learning, teaching and working on open source tools.

Amit Serper

Amit is the go-to person when out of the box thinking is needed to find vulnerabilities in complex infrastructure. Amit can spot the inherent vulnerabilities in embedded systems and is renowned for his shell popping abilities. He’s popped various embedded devices such as routers, IP cameras, even home irrigation systems. At Cybereason, Amit leads research on novel methodologies for identifying complex hacking operations that tend to evade common detection tools. Specifically, he researches large corporate networks, building methods to identify the attacker’s lateral movement from initially penetrating a single endpoint to spreading broadly to taking total control of the attacked.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.