Stream: Virtual Room 6
Time: 10:30 - 11:30
You’ve probably heard of the saying ‘hidden in plain sight’; a technique used by magicians and con-artists for many years.
The beauty of that technique is that the secret item does not attract attention and hence does not become the object of scrutiny.
This technique is termed ‘steganography’. One might think that, with Data Loss Prevention [or DLP, for short] being high priority in most organisations, they will be like a fortress. I would ask you to think again.
Every single exfiltration (the theft or unauthorized removal or movement of any data) technique I present is absolutely stealth for ANY DLP software.
WARNING: Please do not attend if you have a weak heart.
Since my first introduction to computers, albeit through the gaming industry, I was fascinated with the log and algorithms that make computers do what they do. Furthermore, the people who write the programs and what goes on in their minds. I worked my way through various roles in IT, ranging all the way from a PC operator through to a fully-fledged support engineer. I was introduced and developed a passion for forensic science and then digital forensics, as I saw the world was changing rapidly and there was a greater need for a sophisticated approach to guarding valuable corporate and customer data.
Since my first introduction to computers, albeit through the gaming industry, I was fascinated with the log and algorithms that make computers do what they do. Furthermore, the people who write the programs and what goes on in their minds. I worked my way through various roles in IT, ranging all the way from a PC operator through to a fully-fledged support engineer. I was introduced and developed a passion for forensic science and then digital forensics, as I saw the world was changing rapidly and there was a greater need for a sophisticated approach to guarding valuable corporate and customer data.
Since my first introduction to computers, albeit through the gaming industry, I was fascinated with the log and algorithms that make computers do what they do. Furthermore, the people who write the programs and what goes on in their minds. I worked my way through various roles in IT, ranging all the way from a PC operator through to a fully-fledged support engineer. I was introduced and developed a passion for forensic science and then digital forensics, as I saw the world was changing rapidly and there was a greater need for a sophisticated approach to guarding valuable corporate and customer data.
Since my first introduction to computers, albeit through the gaming industry, I was fascinated with the log and algorithms that make computers do what they do. Furthermore, the people who write the programs and what goes on in their minds. I worked my way through various roles in IT, ranging all the way from a PC operator through to a fully-fledged support engineer. I was introduced and developed a passion for forensic science and then digital forensics, as I saw the world was changing rapidly and there was a greater need for a sophisticated approach to guarding valuable corporate and customer data.
Click here to give some Feedback so we can make it even better next year!