1:30 Registration and networking
2:00 First Topic: Enterprise Malware Hunting
2:45 Break and snacks
3:00 Second Topic: to be determined
3:45 Closing announcements and more networking
3:50 Plant tour of Kent Record Management
First Topic: Enterprise Malware Hunting - Chris Payne, Director Of Information Security and Aaron Helikkila, Security Engineer at Spectrum Health
The development and distribution of malicious software has become increasingly targeted and incredibly profitable while enterprise defenses have far lagged behind. Malware is no longer just the realm of kids trying to demonstrate technological prowess. In presentation we will discuss some common malware tactics that can be zeroed in on to find threats where the most sinister damage may be percolating. The criticality of hunting malware living in your organization can be seen on any news outlet. Tracking down malware that cannot be detected or blocked by off-the-shelf signature-based defenses can be done. Let the hunt begin.
Chris is the Director of Information Security responsible for incident response and security engineering programs system wide. In addition, Chris is both an Adjunct Professor at Davenport University, teaching graduate and undergraduate Information Security courses, and founded GrrCON, the largest annual cyber security conference in the Midwest. Chris has earned a Master of Science and 2 Bachelor degrees along with a myriad of industry certifications. Chris has served as president of the Information Systems Security Association as well as a member of the SANS Global Information Assurance Certification (GIAC) Advisory Board and is a steering committee member of the Department of Homeland Security Cybersecurity Consortium.
Aaron is a Security Engineer responsible for incident response and security engineering on a diverse enterprise network. Aaron earned a Bachelor of Science degree from Davenport University and is currently a Masters of Information Assurance graduate student. Aaron is passionate about malware forensics having both engineered as well as reverse-engineered malware. Aaron is also an avid proponent of Powershell.