Cyber attackers are constantly look for new ways to wreak their havoc and one of the methods they employ is script-based attacks. Most endpoint security products handle file-based attacks well, scripts have therefore emerged as an excellent way for attackers to avoid making changes to a disk, as they easily bypass the threat detection capabilities of most products.
Join us in this webinar, where we explore how script-based or fileless malware operates; how scripts provide initial access, enable evasion, and facilitate lateral movements post-infection. We’ll also address what can be done to prevent them, enabling analysts to recognize and identify attack methods.
Stephen Salinas, Head of Product Marketing at Deep Instinct
Steve has specialized in defining and marketing cutting edge technology solutions that solve complex cybersecurity problems for more than twelve years. His experience includes holding product management, product marketing, and solution engineering positions with leading security vendors. He is a frequent presenter at industry conferences and regularly publishes blogs aimed at providing both business and technical insights to the security community. Steve went to Texas A&M University for undergrad and earned an MBA from Pepperdine University.
Matthew Fulmer, Technical Account Manager at Deep Instinct
Matthew is passionate about cybersecurity and keeping his clients safe via leveraging a prevention first mentality and education. In the past, he worked as an Enterprise Security Engineer focused on endpoint security and combatting the evolution of malware and ransomware. Matthew has the first-hand experience in preventing the implications and ramifications of successful attacks.