Cyberwar on a Shoestring: How Kim Jong Un Stole My Malware


Posted on in Presentations

Global superpowers do not have a monopoly on cyber-warfare. Smaller nations and even nonstate actors may soon crash the party. This presentation will map a viable shortcut to the cyber-battlefield: reverse engineering advanced persistent threat (APT) digital weapons and replacing the payload with a custom Molotov cocktail. The strategic implications of this tactical chicanery are enormous.

Learning Objectives:
1: Explore a critical and often-overlooked aspect of cyber-warfare.
2: Understand the ease with which re-weaponization of malware is possible.
3: Learn how to prepare for this cutting-edge challenge.

Participants
Dr. Kenneth Geers

Participant

External Communications Analyst, Very Good Security

Kārlis Podiņš

Participant

Threat Analyst, cert.lv

Hackers & Threats

government spying anti-malware threat intelligence cyber warfare & cyber weapons


Topic

Subtopic


Share With Your Community