Over the past decade, sandboxes have become the standard tool for the analysis of previously unseen malware. They are embedded in security controls such as NGFWs, email- and web-gateways, play an important role in EDR and XDR implementations, and are widely used for incident response and threat hunting.
However, while you may already have a sandbox, what is it good for, how does it work and does it protect you? In this webinar we discuss a technology you may have ignored.
We’ll cover:
• Background: Common sandbox technology
• Avoidance techniques: How malware avoids detection
• Benchmarking: Ensuring your sandbox is doing what it should
• Sharing IoCs: Generating value throughout your security landscape
Join VMRay and (ISC)2 for a deep-dive into sandboxing and learn how to stop worrying and love your sandbox.
Presenter: Michael Bourton, CISSP, CCSP, CISSP-ISSAP, Senior Security Solutions Engineer, VMRay
Moderator: Alan Chan, CISSP-ISSMP, CSSLP, Member, (ISC)² Hong Kong Chapter