Invisible attacks – visible in your network. How to see and follow the tracks?

A session at CONFidence 2013

  • Mariusz Sawczuk
  • Jochen Belke

Tuesday 28th May, 2013

11:00am to 11:50am (WMT)

The nature of attacks have significantly changed recently. From broad and scattershot to very targeted attacks with persistent adversaries (often times nation-states). The attacks of today use advanced malware, zero-day and APT tactics to penetrate networks for the purpose of control, espionage and data theft. What is the most important, these attacks evade and obfuscate traditional security solutions (FW, IPS, Content Security, Antyvirus, etc.), trying to hide and to be invisible in a compromised network. During this session we will cover this problem. We will present modern technologies which discover and block stealth attacks, with an emphasis on the network layer solutions. We will also present case study of detecting data loss, network reconnaissance activity as well as detecting botnet command, control activity and tracking the spread of a malware infection throughout the network.

About the speakers

This person is speaking at this event.
Mariusz Sawczuk
This person is speaking at this event.
Jochen Belke

Sign in to add slides, notes or videos to this session

CONFidence 2013

Poland Poland, Krakow

28th29th May 2013

Tell your friends!


Time 11:00am11:50am WMT

Date Tue 28th May 2013

Short URL


Official session page


View the schedule


See something wrong?

Report an issue with this session