Malware operators change their behavior in response to defenders and try to thwart researchers. For example, TrickBot can now crash malware researchers' browsers during their analysis. Please join our next Women in Security virtual networking event, with guest speaker Meghan Jacquot, Cyber Threat Intelligence Analyst. Meghan will begin the event discussing the larger landscape of malware with an overview of its history - including ransomware. Several examples of changes will also be shared to demonstrate the consistent evolution that both threat actors and defenders practice. After going into ransomware, the focus will shift to the exfiltration of data with infostealers.
Watch this event to learn:
- How do infostealers work
- What has been their evolution
- What are their TTPs
- What changes are analysts seeing now
In addition to sharing current trends of malware, Meghan will also discuss vendor-neutral mitigation strategies, such as multi-factor authentication and defense in depth. By the end of the event, participants should walk away with a better understanding of the malware landscape and infostealers as well as a few mitigation strategies.
Following Meghan’s session, attendees will break into smaller networking groups where they will share their unique experiences with malware trends, mitigation strategies and share best practices. This event is meant to be interactive and a space where attendees can meet new people in the industry, share their own stories and champion each other to continue personal and professional growth and the battle against cyber threats.
Meghan Jacquot, Cyber Threat Intelligence Analyst
Meghan Jacquot is a curious lifelong learner with a commitment to sharing what she has learned. She is passionate about helping others, speaking at conferences to increase cyber awareness, and is particularly interested in cloud security, threat intelligence, and ethical AI.
