How Nation-States and Criminal Syndicates Use Exploits to Bypass Security (RSA Conference 2017)

Malware authors create millions of unique malware samples every year to bypass web filters and antivirus software. There are significant differences between exploit code written by a nation-state attacker and the code in exploit kits that abuse the same vulnerability. This talk will explain how nation-state attackers meticulously craft their attack code to bypass even next-generation security products.

Detailed Presentation :

(Source : RSA USA 2017)

Speaker :

Mark Loman

Mark Loman is a Director, Engineering, for Next-Gen Technologies at Sophos. As an ethical hacker with a passion for information security, Loman oversees a team of experienced developers responsible for delivering practical signature-less solutions. With more than 10 years of experience, Loman has a keen eye for innovating effective solutions and technology that stop zero-day cyberthreats. With in-depth knowledge of the intricate workings of modern computers and applications, Loman’s team isn’t shy when applying unconventional methods to test and create prevention techniques to battle even persistent attackers. In 2007, Loman founded SurfRight, a cybersecurity software company best known for its tools HitmanPro and HitmanPro Alert. Sophos acquired SurfRight in 2015.

8669813678?profile=original

Pre Register For SACON -  India's First Security Architecture Conference

Join 100+ CISOs and 200+ IT Security Professionals at an exclusive security architecture conference in the Silicon Valley Of India - Bangalore, in November 2017. Pre-Register and get special discount access and talk highlights.

>>Click Here To Pre Register & Avail Special Discounts

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)