Cyber Attack Evasion Techniques

On-Demand Webinar

When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.

From this session you will: 

  • Learn how to identify the different evasion techniques that are being used by malware developers.
  • Hear about advanced malware that uses different evasion combinations.
  • Gain insight on how companies unwittingly contribute to the increased sophistication of evasion techniques.
  • Get actionable insights and techniques on how to impede their effectiveness


This On-demand webinar is hosted by:

Guy Propper-1

Guy Propper, Threat Intelligence Team Leader, Deep Instinct

Guy Propper is the team leader of the Threat Intelligence Team at Deep Instinct, with a wealth of experience in the cyber security world. Guy has several years of cyber security experience in an elite technological operational unit in the Intelligence department of the Israeli Defense Force, and he holds a B.Sc. in Biology and Cognitive Science from the Hebrew University in Jerusalem.


Eric BrunoEric Bruno, Contributing Editor, Dark Reading

Eric Bruno is a contributing editor to Dark Reading with more than 20 years of experience in the information technology community. He is a highly requested moderator and speaker for a variety of conferences and other events on topics spanning the technology spectrum from the desktop to the data center.





Please fill out the form to watch the webinar

By submitting this form, you are confirming you have read and agree to our Privacy and Cookies Policies