Malware & Fileless Malware: How It's Created, How It Spreads, and What To Do About It

Malware has come a long way since the early days of computer viruses.  During this Dark Reading webinar you will hear from experts as they provide an in-depth look at the latest innovations in malware; as well as in “fileless malware,” which forgo the use of malicious payloads in favor of using trusted programs in malicious ways. You’ll also get tips and recommendations on how to detect, and block the latest malware, by improving your IT security processes and using the right tools.

On Demand
1h 00min

Attend this webinar and you'll learn:

  • How to find attackers “living off the land” and manipulating legitimate programs like Powershell and Windows Management Instrumentation tools
  • Why cryptominers are a genuine enterprise IT threat and how to prevent them from being a drag on your performance  
  • What you need to do beyond good backups to stay ahead of the latest innovations in ransomware and ransomworms

Featured Speakers

  • Michael Rosen
    Michael Rosen
    Senior Product Marketing Manager

    Michael brings an extensive track record in secure technology Product Marketing and Product Management, making technical concepts readily accessible to general audiences. He has an MBA in Information Systems and a JD in Law, along with a hands-on technical background in malware analysis sandboxing, encryption products, and multi-vector advanced threat defense. He is passionate about spreading the gospel of safe computing.

  • Andrew Brandt
    Andrew Brandt
    Principal Researcher

    Andrew Brandt is a former investigative reporter turned network forensics investigator and malware analyst who serves as Principal Researcher at SophosLabs. Brandt has worked in information security since 2006 and, prior to working in the industry, covered it extensively as the security editor for PC World for nearly a decade. He has applied his knowledge about the behavior of malicious software and threat actors to profile identifiable characteristics of undesirable or criminal activity, specializing in attackers who target the finance, energy, and government sectors. His analysis techniques seek to determine general principles that can help analysts and defenders rapidly and comprehensively identify the root cause of infection and data loss, putting real-time network data analysis at the front line of prevention.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By