Two Attacks for the Price of One? Defending Against Multi-Intent Malware

  • Date 04 Jun 2019

Two Attacks for the Price of One? Defending Against Multi-Intent Malware

04 Jun 2019, 15:20 - 15:45

Tech Talks

Malware engineers are diversifying their businesses with multi-intent malware, where a single successful compromise can open up multiple streams of revenue. In a sophisticated threat landscape where organisations are struggling to defend against single-intent malware, how can they survive this new class of attacks? In this session, Iko Azoulay, founder and CTO of empow, will discuss how organisations can automate malware and attacker intent classification (by leveraging AI and NLP) to detect, prioritise and remediate both known and unknown threats early in the “diversification process,” so they can put them out of business before they can cause harm.

Learning Outcomes:

  1. How multi-intent malware works and what it’s trying to achieve, so they can better defend against it. 
  2. How to prioritise alerts based on NLP classifications and cause-and-effect analytics methods 
  3. Best practices to automate advanced forensics search using machine learning methods
  4. How to use artificial intelligence, and natural language processing, to effectivity automate integration of threat intelligent platforms in order to build proactive security postures.
  5. Real-world examples of how organisations are battling multi-intent and other advanced malware using an intent-based security strategy.



  • Iko Azoulay


    Founder & CTO


    Iko brings with him to empow many years of expertise in management technology positions. Prior to empow, Iko was Chief Architect at Toga Networks...

Business Issues covered

  1. What will this session help you to do?
    • Deliver security to drive and enable business growth‎
    • Mitigate the effects of new vulnerabilities and exploits‎


We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.