Overview
Syllabus
Start
Kens background
History of security
Malware
Signatures
Bypass signature detection
How malware is today
Semantics
Healthcare
ZDI
Signature Index
My favorite hacker movies
Telephone method
Signature
Monitoring
Processes
Watch processes
Machine learning
Signature model
Business model
Statistical model
Silver Bullet
Threat Model
Crypto Mining
I got something different
My real name
Run it right
Sandbox
Customizing the sandbox
Key logger
File drops
Process IDs
Trend Slide
Web Filtering
Microsoft
Microsoft Toolkit
The Sandbox
Wrapup
Bringing it back
Conclusion
Questions