Using some Google-Fu, I was able to find some MIRCon 2014 presentation slides (sorry, no videos yet).
Mandiant MIRCon 2014 Presentation Slides:
-
R&D Track: An Insight into Symbiotic APT Groups
-
IR Track: The Best and Worst APT Malware
-
OSX Malware Plists, Shell Scripts and Object-C Oh-My!
-
APT Detection with Whitelisting and Log Monitoring
-
Management Track: Compliance Risks in APT Response & Defense
-
Management Track: Application of Game Theory and Adversarial
-
The Past as Prologue: Potential Theories of Liability Following a Cyber Attack
-
Did You Check the Packet?
-
Why PowerShell?
-
Analysis of Malicious Security Support Provider DLLs
-
Domain Hygiene as a Predictor of Badness
-
Into the Unknown: Assessing your BIOS
-
Hobbled Penetration Testing
-
Enterprise Cloud Security via DevSecOps
-
There’s Something About WMI
-
Who DIT It?
-
Security Matryoshka: The Ins, Outs, and
-
Advice from the Trenches: Preparing for the Challenges and Pressures of a Security Incident Investigation
-
Machine Learning
-
PIN Down the Malware
-
Taming the Wild West: Finding Evil with Cloud – Based Analytical Tools
-
how i forced an android vulnerability into bypassing MDM restrictions & DIY malware analysis
-
Cyber Security Meets Corporate Securities:The SEC’s Authority to Regulate Companies’ Cyber Defenses and Corporate Directors’ Fiduciary Responsibilities
-
Applied Detection and Analysis Using Network Flow Data
Recent Comments