Description
Runtime exploits continue to create major issues for security practitioners, especially in long-life systems. How are these attacks deployed? What can you do to prevent them? In this webcast, senior SANS instructor Chris Crowley will provide recommendations and guidance and relate his experiences using the RunSafe Security’s Alkemist.
The guide will address:
- An example of a kill-chain in a predominantly interpreted-code environment (risk is present, even in Java/scripted environments, because there is so much compiled code running the interpreted code)
- Other examples of specific, real-world kill chains that utilize memory corruption, with example(s) of an exploit on vulnerable code
- Demonstrating the use of the RunSafe Securitys Alkemist when applied to the exploit and the resulting effect
- Best ways to apply the tool and tips and recommendations
Sponsored by:
Registration Fees
Registration for this event is complimentary. Sponsored by RunSafe Security Inc.
Agenda
Wednesday, September 16, 2020 | ||
---|---|---|
Preventing Runtime Exploits: An Implementation Guide for RunSafe Security’s Alkemist | 2:00 PM |
Speakers
Vice President, Security Engineering
RunSafe Security, Inc.
RunSafe Security, Inc.
Shane Fry is the Vice President of Security Engineering at RunSafe Security, Inc. He has over a dec...(read more)
SANS Senior Instructor
Independent Consultant
Independent Consultant
Christopher Crowley, a SANS Senior Instructor, has 15 years of industry experience managing and secu...(read more)