Top Cybersecurity Training Protects Your Assets - Learn From the BEST and Apply New Knowledge Immediately!


To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.

Understanding Fileless Attacks and How to Stop Them

  • Friday, September 29, 2017 at 1:00 PM EDT (2017-09-29 17:00:00 UTC)
  • Jackie Castelli, John Pescatore


  • CrowdStrike, Inc.

You can now attend the webcast using your mobile device!



How adversaries use fileless attacks to evade your security and what you can do about it.

Standard security solutions have continued to improve in their ability to detect and block malware and cyberattacks. This has forced cybercriminals to employ stealthier methods of evading legacy security to achieve success, including launching fileless attacks, where no executable file is written to disk. Join CrowdStrike security experts for a webcast, Understanding Fileless Attacks and How to Stop Them, where youll learn why so many of todays adversaries are abandoning yesterdays malware and relying on an evolving array of fileless exploits. Youll learn how fileless attacks are conceived and executed and why they are successfully evading the standard security measures employed by most organizations. Youll also receive guidance on the best practices for defending your organization against these stealthy, damaging attacks.


Join this webcast to learn:


  • How a fileless attack is executed  see how an end-to-end attack unfolds
  • Why fileless attacks are having so much success evading legacy security solutions
  • How you can protect your organization from being victimized by a fileless attack, including the security technologies and policies that are most effective



Speaker Bios

Jackie Castelli

Jackie Castelli, CISSP, has over 20 years of experience in the cybersecurity industry. She has gained practical security experience in her roles as a security architect and data center manager. As a senior product marketing manager for CrowdStrike, she is responsible for educating the market about the Falcon platform, CrowdStrike’s next-generation endpoint protection solution. Prior to CrowdStrike, Jackie worked in technical roles in pre-sales, IT and support. Jackie frequently speaks on cybersecurity topics at executive briefings and industry events.

John Pescatore

John Pescatore joined SANS as director of emerging security trends in January 2013 after more than 13 years as lead security analyst for Gartner, running consulting groups at Trusted Information Systems and Entrust, 11 years with GTE, and service with both the National Security Agency, where he designed secure voice systems, and the U.S. Secret Service, where he developed secure communications and surveillance systems and "the occasional ballistic armor installation." John has testified before Congress about cybersecurity, was named one of the 15 most-influential people in security in 2008 and is an NSA-certified cryptologic engineer.

Need Help? Visit our FAQ page or email

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.