Whenever new malware shows up, threat hunters and network defenders should be asking themselves: “Would we detect this in our enterprise environment?” In this webinar, we’ll take a practical example from a recently-published malware analysis report on BoratRAT, and walk through the process that Binary Defense threat hunters took to build a threat emulation using the SCYTHE platform. Rather than guess what it would look like if the malware ran, we’ll show how to run the SCYTHE threat to test your detection logic and find any gaps in your defenses.
Join Binary Defense Vice President of Threat Hunting and Counterintelligence, Randy Pargman, and SCYTHE Chief Technology Officer, Jorge Orchilles, during this webinar where they will cover the following topics:
- What a successful malware execution looks like
- Ways to efficiently and reliably test your environment
- Processes to have in place to increase your security
- How and where to detect threats