Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Header Desktop GData
IT Security Talks Technology I

G DATA - Proactive protection technologies against cybercriminals‘ tricks

How do cybercriminals overcome protections to successfully attack computer systems? How can modern technologies protect from these attacks?

calendar_today Thu, 15.04.2021, 11:15 - 11:30

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Product

south_east

Themes

Endpoint Protection Data security / DLP / Know-how protection Cloud Security

Event

This action is part of the event IT Security Talks

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

In recent years, cybercriminals were able to shift the economic burden in the endless cat-and-mouse game of IT security to the defenders. Malware authors constantly shorten the update cycle of their malicious software by automatically applying obfuscation layers to their samples. Malware authors also highly limit the amount of their own code visible on a machine by using stock tools in so-called "living-off-the-land"-attacks, or don't store their malware on disk at all, known as "file-less malware".

All of these techniques specifically limit the effectiveness of traditional static pattern detection. From the attackers' point of view, these techniques are relatively cheap to implement. On the other hand, attacks using these techniques significantly raise costs for defenders to be able to keep up comprehensive protection. To overcome these limitations, a paradigm shift and new detection approaches are needed. One approach discussed here is based on machine learning combined with in-depth memory analysis. The other approach is to store the full system behaviour in a graph database and scan this graph for known malicious behaviour. Malware can easily change its outward appearance, but the tactics, techniques and procedures (TTPs) used in malware attacks keep the same. While malware can easily obfuscate or hide its presence on disk, actions within the process memory and interactions with the system are still visible and can therefore also be detected. This talk will explore the effect of current real-world malware examples on traditional detection methods. We will also show how the discussed protection technologies enable resilient detections.

... read more

Language: German

Questions and Answers: Yes

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.