Fileless attacks achieve a breach without writing files to the host system. By leveraging legitimate system resources for malicious purposes, fileless malware effectively hides from almost all traditional threat detection methods.
Join in this webinar to learn more:
Jim Walter, Sr. Security Researcher, BlackBerry Cylance
Jim Walter is a senior member of Cylance's Research team. He focuses on next-level attacks, actors, and campaigns as well as 'underground' markets and associated criminal activity. Jim is a regular speaker at cybersecurity events and has authored numerous articles, whitepapers and blogs specific to advanced/low-level threats. Jim joined Cylance following 17 years at McAfee/Intel Security running their Advanced Threat Research and Threat Intelligence teams and content streams.
Jamie French, Sr. Solutions Manager, Unisys
With 25+ years of compounding work experience, Jamie French has consulted and advised on more than 100 projects for clients ranging from Global Fortune 50 to small/medium organizations in the private and public sector in all verticals and most theaters. Jamie is a Security Operations enablement expert who’s spearheaded successful projects achieving sustainable risk reduction, cost reduction, regulatory compliance, and predictable operational costs solving complex business and technical challenges.