Preventing Runtime Exploits: The SANS Implementation Guide for RunSafe Securitys Alkemist

  • Webcast Aired Tuesday, 18 Aug 2020 2:00PM EDT (18 Aug 2020 18:00 UTC)
  • Speaker: Chris Crowley

Runtime exploits continue to create major issues for security practitioners, especially in long-life systems. How are these attacks deployed? What can you do to prevent them? In this new SANS webcast, senior SANS instructor Chris Crowley will provide recommendations and guidance and relate his experiences using the RunSafe Security’s Alkemist.

The guide will address:

  • An example of a kill-chain in a predominantly interpreted-code environment (risk is present, even in Java/scripted environments, because there is so much compiled code running the interpreted code)
  • Other examples of specific, real-world kill chains that utilize memory corruption, with example(s) of an exploit on vulnerable code
  • Demonstrating the use of the RunSafe Securitys Alkemist when applied to the exploit and the resulting effect
  • Best ways to apply the tool and tips and recommendations

Register now and be the first to get the associated implementation guide identifying exploits, testing Alkemist, and tips and techniques for preventing such exploits.

Sponsor

RunSafe_Security.png