Knock, knock, knocking on PwC's door

Friday 6 October 11:30 - 12:00, Green room

Bart Parys (PwC)

With a 225,000+ workforce which spans more than 150 countries, and with most major organizations in the world as clients, PwC is on the receiving end of a wide variety of both commodity and targeted threat activity.

This technical talk will outline some of the more interesting techniques and targeting we have observed against our own corporate network over the last six months, with a focus on both the details of the techniques as well as some of the adversaries behind the activity.

 

Bart-Parys-web.jpg

Bart Parys

Bart Parys has worked for over seven years in the IT industry and is currently a threat intelligence analyst at PwC. Before joining PwC, he worked for several years in the anti-virus industry at Panda Security as a malware researcher. Currently, his focus lies in tracking and hunting Advanced Persistent Threat groups.

His main interests range from anything malware-related to psychology and languages (and one does not exclude the other!).

Bart is fluent in Dutch, English, French and German.

@bartblaze



Register.jpg

VB2017 OVERVIEW

WHY ATTEND

SPEAKERS

PROGRAMME

REGISTER NOW!

VENUE

BOOK HOTEL

VB2017 FOOSBALL TOURNAMENT


Other VB2017 papers

Keynote address: Inside Cloudbleed

John Graham-Cumming (Cloudflare)

In February 2017, Cloudflare was revealed to have been leaking private information including HTTP headers, cookies and POST data…

The state of cybersecurity in Africa: Kenya

Tyrus Kamau (Euclid Consultancy)

The cyber threats Kenya faces range from basic hacking such as website defacements, financial fraud, social media account…

Walking in your enemy's shadow: when fourth-party collection becomes attribution hell

Juan Andres Guerrero-Saade (Kaspersky Lab)

Costin Raiu (Kaspersky Lab)

Attribution is complicated under the best of circumstances. Sparse attributory indicators and the possibility of overt…