When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.
From this session you will:
This On-demand webinar is hosted by:
Guy Propper, Threat Intelligence Team Leader, Deep Instinct
Guy Propper is the team leader of the Threat Intelligence Team at Deep Instinct, with a wealth of experience in the cyber security world. Guy has several years of cyber security experience in an elite technological operational unit in the Intelligence department of the Israeli Defense Force, and he holds a B.Sc. in Biology and Cognitive Science from the Hebrew University in Jerusalem.
Eric Bruno, Contributing Editor, Dark Reading
Eric Bruno is a contributing editor to Dark Reading with more than 20 years of experience in the information technology community. He is a highly requested moderator and speaker for a variety of conferences and other events on topics spanning the technology spectrum from the desktop to the data center.