Hack Red Con 2024
-
It’s Breach O’Clock! Do You Know What Your MSSP is Doing?
Joe SarkisianDone
-
Tough Adversary? Don’t Blame Sun Tzu
Dr. Gregory CarpenterDone
-
Social engineering the social engineers, you suck at buying software.
David GirvinDone
-
Your own personal C2. – Securing your RMM.
Jonathan RogersDone
-
Self-Advocacy in Cybersecurity: How Personal Empowerment Drives Innovation and Resilience
Jacqlene MonétDone
-
Intro to Infrastructure Automation for Offensive Security
Alex MartirosyanDone
-
Opening Ceremony
Done
-
Keynote Round Table - Ed Skoudis, Dave Kennedy, Ken Nevers, Amanda Berlin
Done
-
Registration Opens
Done
-
Mission: Possible
David BoydDone
Jon “Wally” Prather is an Engagement Manager and Team Leader with Trellix Threat Intelligence Group. With 21 years of experience in everything from Counterintelligence and Targeting to Cyber Threat Intelligence and Data Dumps, Wally is undoubtedly a well-rounded and active member of the cyber community.
Wally's goal is to inform the audience and conference attendees that an entire world of intelligence analysis has yet to be tapped into.
Jeff Smeal
Jeff Smeal is a cybersecurity threat analyst and senior intelligence professional with 14 years of combined expertise across multiple intelligence disciplines and cybersecurity operations, specializing in malware behavioral forensics. He has front-line incident response SOC experience, provided timely initial triage / behavior malware analysis and technical expertise to decision makers and key stakeholders during, but not limited to, high-profile cyber-attacks to include: Solar Winds supply-chain backdoor compromise / Kaseya supply-chain ransomware attack / Colonial Pipeline and JBS ransomware attack / ‘Log4Shell’ exploit / Russia/Ukraine conflict – Pro-Russian hacktivist destructive malware. Additionally, Jeff has 10 experience as a US Navy Intelligence Specialist, with 7 year of all-source kinetic warfare intelligence support while operating overseas or at sea, and 3 years as a cyber warfare specialist.
Within the cybersecurity threat intelligence landscape, malware forensics provides crucial value to analytical efforts and is a key component of both operational and customer success. This presentation will begin with an overview of the malware analysis process, covering basic static and dynamic analytical concepts and techniques. It will then delve into practiced methodologies for utilizing malware forensic findings and artifacts to provide direct support and enhanced value to threat intelligence researchers.
The second portion of this brief shows how data collected during the forensic analysis can be utilized, enriched, and visualized into a usable and practical analytical product.