Defeating Detection Mechanisms in Todays Network

ABSTRACT

The endpoint is continuing to be a large focus for enterprises for most organizations due to the severe lack of visibility. An entire market has spawned with an attempt to understand how attackers are initially compromising an organization and performing further post exploitation scenarios. This talk goes through a number of techniques and tactics designed to evade endpoint detection and focus on more targeted attack vectors.

SPEAKER

David Kennedy is founder of TrustedSec and Binary Defense Systems.  Both organizations focus on the betterment of the security industry from an offense and a defense perspective.  David also serves as a board of director for the ISC2 organization. David was the former CSO for a Diebold Incorporated where he ran the entire INFOSEC program.  David is a co-author of the book “Metasploit:  The Penetration Testers Guide”, the creator of the Social-Engineer Toolkit (SET), Artillery, and several popular open source tools.  David has been interviewed by several news organizations including CNN, Fox News, MSNBC, CNBC, Katie Couric, and BBC World News.  David is the co-host of the social-engineer podcast and on several additional podcasts.  David has testified in front of Congress on two occasions on the security around government websites.  David is one of the founding authors of the Penetration Testing Execution Standard (PTES); a framework designed to fix the penetration testing industry. David is the co-founder of DerbyCon, a large-scale conference in Louisville, Kentucky.  Prior to the private sector, David worked for the United States Marine Corps and deployed to Iraq twice for intelligence related missions.