Today’s cyber attackers survive by hiding their attack communications from the prying eyes of network security. It’s a critical part of an attacker’s arsenal and it lets them patiently manage and propagate attacks throughout network, while remaining undetected.
• The latest techniques attackers use to hide their traffic in plain sight
• Why simple techniques like signatures and reputations of domains or IPs come up short in finding these evolving forms of communication
• Why this isn’t really just a malware problem
• What techniques can be used to systematically identity these forms of communication and to treat them as a strong indicator of compromise