Stephen Windsor To Present At Guidance Software’s 2015 CEIC Conference

January 19, 2015

Guidance Software’s 2015 CEIC Conference
Caesar’s Palace
Las Vegas, Nevada
May 18-21, 2015

Stephen Windsor To Present At Guidance Software’s 2015 CEIC Conference

Session: Command and Control Systems
Track: Endpoint Threat Detection and Response
Session Description:
This presentation is an overview of advanced threat actor command and control systems, from implant to control system, we have identified over the last 14 years. We will start with a quick review of older web-based C2 systems and quickly move on to modern-day systems. We will include threat actor, malware, and network countermeasures we have seen advanced threat actors use to prevent the identification and investigation of these systems. We will include a few samples of captured malware and demonstrate several risk mitigation techniques we have seen advanced threat actors use to mitigate their risk, including octet switching, external DNS use, social networking, and other techniques to thwart the investigator and traditional identification solutions.

Guidance Software 2015 CEIC Conference Information

For more information on the CEIC Conference, click here.