Businesses and organizations have been playing a game of cat and mouse with hackers for close to 50 years. The score depends on how you decide to keep it. The corporate approach has traditionally focused on tools and compliance to detect and block attacks, but have you ever wondered how hackers get past things like antivirus, firewalls, and intrusion detection systems? This talk is about diving into the tools and techniques hackers use to regularly evade detection and why what we’re concerned about today is not what attackers will be targeting tomorrow. We’ll do some live demonstrations to see how some of these attacks work, and how hard they can be to detect. By the end, you’ll understand that when it comes to hacking, there are no rules.