isc 2 aus n chapter november 2017 mee ng steganography
play

(ISC) 2 Aus+n Chapter November 2017 Mee+ng: Steganography, - PowerPoint PPT Presentation

(ISC) 2 Aus+n Chapter November 2017 Mee+ng: Steganography, Forensics & Threat Intel WIFI Access Code: 2015indeedjobs 2 Thanks to our sponsors 3 Membership Drive Thanks for joining our mee+ngs! Please support the chapter by becoming a


  1. (ISC) 2 Aus+n Chapter November 2017 Mee+ng: Steganography, Forensics & Threat Intel WIFI Access Code: 2015indeedjobs 2

  2. Thanks to our sponsors 3

  3. Membership Drive » Thanks for joining our mee+ngs! Please support the chapter by becoming a member. There are no dues. » Sign up at hRps://isc2-aus+n-chapter.org/membership/ » Email ques+ons to membership@ics2-aus+n-chapter.org 4

  4. Upcoming Elec+ons » Vo+ng by electronic ballot closes by 12/11 3 pm. » Members will get to vote » Candidates (no+fy: chapter-board@isc2-aus+n- chapter.org) President • - Bart Lauwers Vice President • - Tony HowleR Treasurer • - Wendi White Secretary • - Manuel Eguileor Membership Chair • - Bill Thompson 5

  5. Info-Sec Calendar » 11/13 Aus+n Chapter Mee+ng: Steganography, Forensics & Threat Intel (Carbon Black) » 11/16 InnoTech Aus+n with dedicated ISSA Security Track » 11/29 - 12/1 Threat Intelligence Summit (Code: TI17-ISC2) » 11/29 - 12/1 ITAC Conference (Code: ITAC17-ISC2) » 12/11 Aus+n Security Groups Mixer » 1/8 Aus+n Chapter Mee+ng: The Darknet Economy and What Comes Next (Cyren) » See hRps://isc2-aus+n-chapter.org/events/ for a full list! 6

  6. Find us on Social Media » New Improved Website: www.isc2-aus+n-chapter.org RSVP directly from website for mee+ngs • Other local events listed • » LinkedIn: (ISC) 2 Aus+n Chapter » Facebook: hRps://e.me/Isc2Aus+nChapter » TwiRer: @ISC2ATXAus+nChapter 7

  7. Job Announcements » Looking for a job? » Looking to hire? 8

  8. Other Announcements » Announcements from other organiza+ons / local events? » Please sign in if you haven’t already » Please clean up aker yourself at the end of the mee+ng. Let’s leave Indeed as we found it. 9

  9. Today’s Topic & Speaker: Steganography, Forensics, and Threat Intel » From Na+on State Actors to Foreign Intelligence Officials, Steganography has been used to hide data in malware and espionage campaigns. The use of leveraging Threat Intelligence is something everyone can use for either preven+ng or detec+ng targeted and non-targeted campaigns. Having the ability and skills for conduc+ng Forensic and IR Inves+ga+ons is a cri+cal skill set for detec+ng Steganography use and detec+ng IOCs gathered from Threat Intelligence work. » Mr. Yoon began his security career in 2005 as a Forensic Inves+gator and has obtained industry cer+fica+ons such as CCE, CEH (v7), EnCE, GCIH, and GCFE. He has worked both on the corporate side and in Professional Services conduc+ng numerous inves+ga+ons in various industries. Being a System Engineer on the front lines, he is able to work with Security Teams in top Fortune organiza+ons and assist with inves+ga+ons. As a result, he is able to see many malware aRack vectors & trends and work with researchers on piecing together the infec+on life cycle and aRack trends. 10

  10. Thanks to our sponsors 11

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend