(ISC)2 Aus+n Chapter November 2017 Mee+ng: Steganography, Forensics & Threat Intel
2
(ISC) 2 Aus+n Chapter November 2017 Mee+ng: Steganography, - - PowerPoint PPT Presentation
(ISC) 2 Aus+n Chapter November 2017 Mee+ng: Steganography, Forensics & Threat Intel WIFI Access Code: 2015indeedjobs 2 Thanks to our sponsors 3 Membership Drive Thanks for joining our mee+ngs! Please support the chapter by becoming a
2
3
4
5
6
7
8
9
10
» From Na+on State Actors to Foreign Intelligence Officials, Steganography has been used to hide data in malware and espionage campaigns. The use of leveraging Threat Intelligence is something everyone can use for either preven+ng or detec+ng targeted and non-targeted campaigns. Having the ability and skills for conduc+ng Forensic and IR Inves+ga+ons is a cri+cal skill set for detec+ng Steganography use and detec+ng IOCs gathered from Threat Intelligence work. » Mr. Yoon began his security career in 2005 as a Forensic Inves+gator and has
has worked both on the corporate side and in Professional Services conduc+ng numerous inves+ga+ons in various industries. Being a System Engineer on the front lines, he is able to work with Security Teams in top Fortune organiza+ons and assist with inves+ga+ons. As a result, he is able to see many malware aRack vectors & trends and work with researchers on piecing together the infec+on life cycle and aRack trends.
11