ltechnologygroup.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.
fitting that the last day of MIRcon started with a total lunar
eclipse and ended with an inspirational keynote address by renowned
astrophysicist Dr. Neil deGrasse Tyson. After an amazing two days of
content, MIRcon 2014 is officially in the books! Following are some
of the highlights.
- Chris Sanders and Jason Smith’s presentation, Applied
Detection and Analysis Using Flow Data, discussed how
flow data can be used for detecting both structured and
unstructured threats The presenters also spoke on how flow data
can be used to augment the analysis of network security events
detected by other mechanisms.
- Amanda Stewart brought attendees up to speed about the true
nature of Mac OSX malware, dissected OSX malware authors, and
common threat indicators and evasion techniques of current OSX
malware in the wild during her session, “Plists,
Shell Scripts and Object-C, Oh-My!”
- Russian nesting dolls, or Matyroshka, served as a clever
metaphor for Jacob Kitchel’s session entitled, “The
Security Matryoshka – The Ins, Outs and Challenges of Security
in a Large Utility,” where Jacob discussed the
complexities of managing security in large organizations.
- After lunch, famed astrophysicist Dr. Neil deGrasse Tyson
mesmerized the crowd and gave an inspiring keynote address as he
commented on the state of science in America during his session,
“Science as a way of Knowing”.
- Every good conference needs awards which is why we brought the
“Malies” back for 2014. In “The 2014
‘Malies’ Awards: Best & Worst Targeted Malware of
2014,” Richard Wartell gave attendees a first-hand
look into how to reverse engineer real-world malware and focused
on samples with interesting and comical mistakes that malware
authors made in 2014.
- Closing out the day, Thoufique Haq and Ned Moran discussed
evidence of collaboration among advanced attackers, their shared
tailored tools and evasion techniques, and what their research has
uncovered about varied collaborating groups in their session,
“An Insight into Symbiotic APT Groups”.
Couldn’t make the conference? Register for
the upcoming recap webinar where we’ll present, at a high
level, everything that went on during this year’s MIRcon. To all of
our attendees, thank you for making this year a smashing
At L Technology Group, we know technology alone will not protect us from the risks associated with in cyberspace. Hackers, Nation States like Russia and China along with “Bob” in HR opening that email, are all real threats to your organization. Defending against these threats requires a new strategy that incorporates not only technology, but also intelligent personnel who, eats and breaths cybersecurity. Together with proven processes and techniques combines for an advanced next-generation security solution. Since 2008 L Technology Group has develop people, processes and technology to combat the ever changing threat landscape that businesses face day to day.
Call Toll Free (855) 999-6425 for a FREE Consultation from L Technology Group, https://www.ltechnologygroup.com.