Zum Inhalt springen

Trust in Tech - How advanced hackers operate

Foto von ITPirate
Hosted By
ITPirate
Trust in Tech - How advanced hackers operate

Details

You read about it in the news all the time, company X got breached by advanced hackers, hackers gained full control of customer x.
How do they manage to get in? How do they operate? In this session you will learn more about how advanced hackers operate when they are attacking.
You will experience how hackers bypass some of your investment in security technology such as Antivirus, Reputation Services, Sandboxes, Application Whitelisting and more.

Oddvar is a Microsoft Cloud and Datacenter Management MVP, security researcher, blogger, trainer, Red teamer, speaker and he works at TrustedSec as a Senior Security Consultant where his day to day work is to test the security for various companies. He has more than 18 years of experience in the IT industry. He is passionate about Windows Security and he loves to share his knowledge with everyone. Oddvar has delivered top notch sessions in the past at conferences such as DerbyCon, IT Dev Connections, MVP Dagen, HackCon and Nordic Infrastructure Conference. Oddvar actively contributes to the security community and he is most known for his contribution around the LOLBins (LOLBAS Project), Ultimate AppLocker Bypasslist, autoruns evasion and Mitre Att&ck framework. He has also discovered several weaknesses in the Windows operating system and he also got a CVE for one of the discoveries.

Photo of Trust in Tech Cologne group
Trust in Tech Cologne
Mehr Events anzeigen
Online-Event
Dieses Event ist verstrichen