Hi [[ session.user.profile.firstName ]]

Malware Analysis: Let the Computer Do the Work!

Malware analysts spend a lot of time analyzing code and looking for indicators of compromise from advanced persistent threats and even for the most seasoned analysts the volume of analysis can be prohibitive. In today's environment malware analysts need to leverage automated tools to power thro
Malware analysts spend a lot of time analyzing code and looking for indicators of compromise from advanced persistent threats and even for the most seasoned analysts the volume of analysis can be prohibitive. In today's environment malware analysts need to leverage automated tools to power through large volumes of sample code and quickly receive valuable threat summaries.

Letting the computers do the work allows the analyst to quickly identify files of greatest concern, and focus on remediating especially pernicious attacks. Malicious behavior can now be viewed right down to the kernel level, giving a complete picture of how your network was targeted by a specific cyber threat.

Join Thomas Quinlan as he explores integrating automated threat assessment processes and defining indicators that identify specific threats to your system.
Recorded Jun 20 2012
49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Thomas J. Quinlan, Malware Researcher
Presentation preview: Malware Analysis: Let the Computer Do the Work!
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Malware Analysis: Let the Computer Do the Work!
  • Live at: Jun 20 2012 1:00 pm
  • Presented by: Thomas J. Quinlan, Malware Researcher
  • From:
Your email has been sent.
or close
You must be logged in to email this