Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

  • Date 05 Jun 2019

Cryptography & Malware: How Crooks Hide & How to Spot Them Anyway

05 Jun 2019, 10:40 - 11:05

Technology Showcase
Language:
English

Encryption is a vital part of anyone's cloud security toolkit. It means you can safely use other people's networks and servers to handle even most personal stuff. But the crooks love crypto, too, because it lets them hide their malware and their attack methods behind the same sort of "security shield". 

This talk looks at the fascinating ways that criminals use encryption to build more devious malware - but also shows you how we can turn this deviousness against itself to detect and block attacks.

Learning Outcomes:

  1. Learn about cryptography and malware. 
  2. Understand your cyberenemy.
  3. Find out how to spot so-called "hidden" attacks.
  4. Learn proactive techniques to keep the crooks out.
  5. Have fun! (Everyone loves a good hacking-and-crack-back story.)

 

Contributors

  • Paul Ducklin

    Speaker

    Senior Technologist

    Sophos

    Paul Ducklin has been many things at Sophos: programmer, malware analyst, technical supporter, public speaker, security evangelist, and now...

Business Issues covered

  1. What will this session help you to do?
    • Demonstrate thought-leadership to ensure security is high for corporate agenda & capex justified‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

Sponsors

Sophos

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.