Posted on
in Presentations
This session will reveal uncommon persistence methods used by attackers to maintain stealth in compromised networks. Based on real-world experiences, this session will demonstrate how malware hides even from advanced monitoring tools. Learn how to identify these sneaky tactics and strengthen defenses against persistent threats in Windows environments.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community