Cyber Attack Evasion Techniques

When it comes to evasion techniques there’s a perpetual cat and mouse game between malware developers and solutions providers. By drawing on the latest in evasion techniques, malware developers not only go undetected on the compromised machine but more importantly, they hide their malicious indicators and behaviors from detection tools and automated threat analysis systems.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Learn how to identify the different evasion techniques that are being used by malware developers
  • Hear about advanced malware that uses different evasion combinations
  • Gain insight on how companies unwittingly contribute to the increased sophistication of evasion techniques
  • Get actionable insights and techniques on how to impede their effectiveness

Featured Speakers

  • Guy Proper
    Guy Proper
    Threat Intelligence Team Leader
    Deep Instinct

    Guy Propper is the team leader of the Threat Intelligence Team at Deep Instinct, with a wealth of experience in the cyber security world. Guy has several years of cyber security experience in an elite technological operational unit in the Intelligence department of the Israeli Defense Force, and he holds a B.Sc. in Biology and Cognitive Science from the Hebrew University in Jerusalem.

  • Eric Bruno
    Eric Bruno
    Contributing Editor
    Dark Reading

    Eric Bruno is a contributing editor to Dark Reading with more than 20 years of experience in the information technology community. He is a highly requested moderator and speaker for a variety of conferences and other events on topics spanning the technology spectrum from the desktop to the data center.

Sponsored By