Presenter Photo

‘Budget coding’ is an approach typical of current malware writers. The reason is simple: it is too costly to expend time writing perfect code, when an ‘imperfect’ malware can already be earning its living. When designing your cyber defense, these malware coding ‘imperfections’ need to be appreciated as they reveal patterns in thinking that can help you later.

Join pentester and renowned cybersecurity speaker, Paula Januszkiewicz, for an extremely technical session! Some topics she will cover and demonstrate include:

  • SDDL - Can antivirus be stopped?
  • Techniques for malware discovery
  • Evasion techniques used by Malware (packers and encryptors, wrapping, Hyperion, obfuscation, anti-debugging, targeting, etc.),
  • Reflective PE Loader
  • Antimalware Scan Interface (AMSI)

If you missed Paula’s session at Ignite in Orlando, FL, now’s your chance to join her live!

ISC2 CPE Logo

CPE Credit Qualification: Many of our webinars qualify as CPE credit. Please provide your (ISC)2 ID certificate number when you register for the webinar and your CPEs will automatically be added to your (ISC)2 account within 4-6 weeks.