About this event
Agenda
Available on demand
-
Behind the Analysis: Unveiling the Workflow of Malware Research
Rob Pantazopoulos, Malware Research Lead
-
A Freelance Job with a Side of Malware: Contagious Interview
Sarah Kern, DPRK & Emerging Threats Lead
-
Integrating Policies, Risk Assessments, and Business Impact Analyses for Robust Cybersecurity
Brian Yonek, Senior Global Incident Commander
-
Malware Intelligence at Scale: Assembling the Pieces of Large-Scale Malware Intelligence
Nick Bargnesi, Senior Security Researcher
-
Business Email Compromise: What is it and how has it evolved in 2024?
Aiden Sinnott, Security Researcher
-
60% of the Time This Will Catch a Hacker Every Time
Eric Escobar, Principal Security Consultant - Incident Response
-
From Infostealer to Ransomware: A Hands-On Incident Responder Perspective
Chris Ahearn, Director Incident Response & Zack Dowling, Principal Consultant - Incident Response
-
Microsoft Entra ID Applications as a Breach Vector
Joosua Santasalo, Senior Principal Security Researcher
-
Inside the D3Fck Loader: A Deep Dive into Malware-as-a-Service
Rob Pantazopoulos, Malware Research Lead
-
Adversary-in-the-Middle (AiTM) Attacks: What You Need to Know
Tim Mitchell, Senior Security Researcher
-
From Underground Chatter to Actionable Intelligence: The Lifecycle of Human Intelligence
Ben Drysdale, Senior Manager
-
From Underground POC, to Exploited CVE: The Adversarial Pathway to Successful Exploitation
Hamish Maguire, Security Researcher & Frank Hackett, Security Researcher