Understanding Attacker’s use of Covert Communications
Today’s cyber attackers survive by hiding their attack communications from the prying eyes of network security. It’s a critical part of an attacker’s arsenal and it lets them patiently manage and propagate attacks throughout network, while remaining undetected.
What techniques can be used to systematically identity these forms of communication and to treat them as a strong indicator of compromise?
Our Speaker: Oliver Tavakoli
Oliver Tavakoli is Chief Technical Officer of Vectra Networks. Oliver is a technologist who has alternated between working for large and small companies throughout his 25-year career – he is clearly doing the latter right now. Prior to joining Vectra Networks, Oliver spent more than 7 years at Juniper as Chief Technical Officer for the security business. Oliver joined Juniper as the result of its acquisition of Funk Software, where Oliver was CTO and better known as developer #1 for Steel-Belted Radius – you can ask him what product name came in second in the naming contest. Prior to joining Funk Software, Oliver co-founded Trilogy Inc. and prior to that, he did stints at Novell, Fluent Machines and IBM.
Vectra® Networks is the leader in real-time detection of in-progress cyber attacks. The company’s automated threat management solution continuously monitors internal network traffic to pinpoint cyber attacks as they happen. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. www.vectranetworks.com.
Regional Sales Manager
Vectra Networks, Inc.