Knock, knock, knocking on PwC's door

Friday 6 October 11:30 - 12:00, Green room

Bart Parys (PwC)

With a 225,000+ strong workforce which spans more than 150 countries, and with most major organizations in the world as clients, including most companies in the Fortune 500, PwC is on the receiving end of a wide variety of both commodity and targeted threat activity.

This technical talk will not only outline how we deal with incidents, but will also detail some of the more interesting techniques and targeting we have observed recently against both PwC and its clients, with a focus on the details of the techniques as well as some of the adversaries behind the activity.

 

Bart-Parys-web.jpg

Bart Parys

Bart Parys has worked for over seven years in the IT industry and is currently a threat intelligence analyst at PwC. Before joining PwC, he worked for several years in the anti-virus industry at Panda Security as a malware researcher. Currently, his focus lies in tracking and hunting Advanced Persistent Threat groups.

His main interests range from anything malware-related to psychology and languages (and one does not exclude the other!).

Bart is fluent in Dutch, English, French and German.

@bartblaze



Register.jpg

VB2017 OVERVIEW

WHY ATTEND

SPEAKERS

PROGRAMME

REGISTER NOW!

VENUE

BOOK HOTEL

VB2017 DRINKS RECEPTION

VB2017 FOOSBALL TOURNAMENT

2017 PÉTER SZŐR AWARD


Other VB2017 papers

XAgent: APT28 cyber espionage on macOS

Tiberius Axinte (Bitdefender)

This paper provides an in-depth analysis of the macOS version of the APT28 component known as XAgent. We will dissect the…

Mariachis and jackpotting: ATM malware from Latin America

Thiago Marques (Kaspersky Lab)

Fabio Assolini (Kaspersky Lab)

Of all the forms of attack against financial institutions in the world, the ones that are most likely to combine traditional…

Keynote address: Inside Cloudbleed

John Graham-Cumming (Cloudflare)

In February 2017, Cloudflare was revealed to have been leaking private information including HTTP headers, cookies and POST data…