Close

Gone With the Bytes - A Digital Forensic Saga

(6N)

Stream: Virtual Room 6
Time: 10:30 - 11:30


Presentation

You’ve probably heard of the saying ‘hidden in plain sight’; a technique used by magicians and con-artists for many years.

The beauty of that technique is that the secret item does not attract attention and hence does not become the object of scrutiny.

This technique is termed ‘steganography’. One might think that, with Data Loss Prevention [or DLP, for short] being high priority in most organisations, they will be like a fortress. I would ask you to think again.

Every single exfiltration (the theft or unauthorized removal or movement of any data) technique I present is absolutely stealth for ANY DLP software.

WARNING: Please do not attend if you have a weak heart.

Attachments

6N Attachments

Speakers


  • Cristian Coraci at ?
  • Since my first introduction to computers, albeit through the gaming industry, I was fascinated with the log and algorithms that make computers do what they do. Furthermore, the people who write the programs and what goes on in their minds. I worked my way through various roles in IT, ranging all the way from a PC operator through to a fully-fledged support engineer. I was introduced and developed a passion for forensic science and then digital forensics, as I saw the world was changing rapidly and there was a greater need for a sophisticated approach to guarding valuable corporate and customer data.


    Email: mrcmcoraci16@gmail.com

  • Cristian Coraci at ?
  • Since my first introduction to computers, albeit through the gaming industry, I was fascinated with the log and algorithms that make computers do what they do. Furthermore, the people who write the programs and what goes on in their minds. I worked my way through various roles in IT, ranging all the way from a PC operator through to a fully-fledged support engineer. I was introduced and developed a passion for forensic science and then digital forensics, as I saw the world was changing rapidly and there was a greater need for a sophisticated approach to guarding valuable corporate and customer data.


    Email: mrcmcoraci16@gmail.com

  • Cristian Coraci at ?
  • Since my first introduction to computers, albeit through the gaming industry, I was fascinated with the log and algorithms that make computers do what they do. Furthermore, the people who write the programs and what goes on in their minds. I worked my way through various roles in IT, ranging all the way from a PC operator through to a fully-fledged support engineer. I was introduced and developed a passion for forensic science and then digital forensics, as I saw the world was changing rapidly and there was a greater need for a sophisticated approach to guarding valuable corporate and customer data.


    Email: mrcmcoraci16@gmail.com

  • Cristian Coraci at ?
  • Since my first introduction to computers, albeit through the gaming industry, I was fascinated with the log and algorithms that make computers do what they do. Furthermore, the people who write the programs and what goes on in their minds. I worked my way through various roles in IT, ranging all the way from a PC operator through to a fully-fledged support engineer. I was introduced and developed a passion for forensic science and then digital forensics, as I saw the world was changing rapidly and there was a greater need for a sophisticated approach to guarding valuable corporate and customer data.


    Email: mrcmcoraci16@gmail.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!