Monitoring and Hunting for Malware Through the Cloud and Down to Remote Workers.

Logo
Presented by

Sanjay Raja, VP Prevailion

About this talk

A previously impossible challenge for organizations has been gaining any visibility into malware compromises that leverage dynamic and ephemeral addressing behind ISPs and Cloud providers in order to hide attack campaigns. What if you could monitor and track malware activity through the provider haze, right down to the compromised asset on both ends - regardless of being hidden behind the cloud, ISP or even your own external perimeter? Consider that remote workers often are using systems that are connected to vulnerable home systems, video game consoles etc. The opportunity for cross-infection of corporate networks is seriously extensive. In this session, learn how: • New techniques and approaches to monitoring cloud networks and how to gain visibility into malware compromises • Seeing past the ISP which have typically obscured security teams from seeing attack activity, especially when unable to employ remote agents. • The rise of encrypted traffic means a loss of visibility from security tools, therefore focusing on external intelligence is fundamental in understanding the threat landscape.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (8)
Subscribers (856)
See cyber attacks from the vantage point of threat actors and prevent breaches before they happen. Prevailion is a next-generation cyber intelligence company protecting global organizations by providing unmatched insights into the real-time threats targeting their networks.