Dissection of Malware
Increase your awareness of malware threats and build better capability to defend against rapidly growing cybercrimes.
This session will explore how malware works and address prevention, detection and response procedures.
Malicious software, malware, is increasing in popularity for criminal use, and the capabilities of these programs are exploding. Hackers have shifted focus to phishing campaigns with the primary goal of executing malware on your employee’s or customer’s computer, in some cases, resulting in complete control of a system by a criminal. This session will explore how malware works by dissecting a piece of malware and reviewing the various usages in perpetuating financial intuition related cybercrimes.
Please join us to increase awareness on malware threats and build better capability to defend against rapidly growing cybercrimes. Controls discussed will address prevention, detection and response procedures related to malware.
The following topics will be discussed:
- FFIEC Destructive Malware guidance
- US-Cert top 30 targeted high risk vulnerabilities
- Detailed analysis on how malware works
- Overview commonly known malware variants
- Usage in corporate account takeover
- Effect on ATM Fraud highlighted in FFIEC ATM guidance
- Adoption by advanced persistent threats (APT) such as Carbanak
- Layered information security program controls methods to reduce risk
- Malware addressed in incident response programs and computer forensics
- Customer, bank and vendor controls necessary to address malware
This session will provide benefits to both technical and managerial staff members looking to better understand malware and improve layered controls to protect your institution.
Chad Knutson, CISSP, CISA, CRISC, is the co-founder of Secure Banking Solutions (SBS) where he serves as Senior Information Security Consultant and VP of Research and Development. He is also VP of the SBS Institute. SBS works with more than 500 banks in the U.S. on information security services such as the development of information security programs, policies and risk assessments, IT audits, penetration testing, vulnerability assessments and more.
Josh Stroschein serves as an instructor of Information Systems at Dakota State University (DSU) in Madison, SD. He is also an instructor with the SBS Institute. Josh has spent over a decade as a programmer and consultant with a focus on web applications and application security. His research interests include malware analysis, application security, software development and wireless communications.
Institute of Certified Bankers: Visit http://www.icbmembers.org/login.aspx for instructions regarding self-reporting. Estimated credits: 2 hours/session
Member price: $275.00 | Non member price $550.00
Member price: $295.00 | Non member price $560.00
Online: Visit the CBA Webinar Catalog
Mail: Click here and mail completed form with check payable to ConferenceEdge to: (Mail at least 10 days prior to event)
1516 Xavier St., Ste 500, Denver, CO 80204
Phone: Call ConferenceEdge at (877) 988-7526 (credit card payments only)
- Preferred Payment Method: Online
- Please register online or by phone when paying with a credit card
- Payment Must Accompany Registration – Invoices are Not Provided
Register online up to day of event. Earlier registration allows time to check your computer for an optimal experience.