PHD-IT-L Archives

March 2014

PHD-IT-L@LISTSERV.GMU.EDU

Options: Use Monospaced Font
Show HTML Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
MIME-Version:
1.0
Sender:
Subject:
From:
Damon Mccoy <[log in to unmask]>
Date:
Mon, 24 Mar 2014 16:09:41 +0000
Content-Type:
multipart/alternative; boundary="_000_1f5683578cad4c1b9d7eae31d429d24aDM2PR05MB416namprd05pro_"
Comments:
Reply-To:
Damon Mccoy <[log in to unmask]>
Parts/Attachments:
text/plain (1204 bytes) , text/html (4 kB)
Hello everyone,


Lunch seminar will return this semester, Thursday (3/27) at Noon in 4201, with a talk from Andrew Hunt. This will be both an informational tech talk and a recruitment talk and Pizza will be provided.


Abstract:


In APT as Art, Andrew Hunt will describe the utilization of historical repositories, graph analysis, and visualization techniques to develop intelligence about adversary behavior. Armed with this knowledge, early staging of campaigns can be tracked, allowing for more effective, preemptive action to engage the adversary and tip the advantage to the defenders.


Bio:


Andrew Hunt is a Senior Security Engineer engaged in data science research and reverse engineering at Bechtel Corporation, a global construction and engineering firm engaged in large-scale projects. Mr. Hunt's most recent engagements include a multi-year development of cyber data analytics clusters, brute-force decryption techniques applied to common encoding algorithms employed by adversaries, and automating the analysis of malicious Android applications. His particular foci are generator/packer analysis, data research, and sensor and feed development to advance insights into adversary behaviors.



ATOM RSS1 RSS2