Contact Us   |   Print Page   |   Sign In   |   Register
June 2018 ISSA Web Conference

ISSA Thought Leadership Series: Making sense of Fileless Malware

Recorded (1 Hour Event) on Wednesday, June 13, 2018

Click here to view the recording.
Click here for the presentation.
Click here to take the CPE quiz.


Fileless malware attacks are steadily growing in recent years, both in absolute numbers and in their share of the threat landscape. Fileless attacks pose an increasing threat to organizations and a challenge for security vendors, due to the use of various non-executable file formats for infection, and the ability to conduct parts of the attack vector in-memory only. Cyber criminals are adopting fileless and memory-based attack techniques, which were once mostly used by nation-states. The panel will deal with the various differing definitions of fileless malware, overview some of the solutions and approaches taken by industry players in protecting from fileless threats, and discuss ideas and best practices for dealing with these threats.


Debbie Christofferson, ISSA International Board of Directors, CISO Advisory Council Chair


Fortune 500 enterprise wide Information Security Manager with experience across the US, Europe and Asia. Strategic security leader and consultant with broad comprehensive security and risk management experience. Know security from the ground up and what it takes to succeed. Certifications: CISSP, CISM. Strong collaborator and high energy leader. 2018 book published: “Women in Security”. Debbie also has facilitated CISM certification exam prep workshops since 2005, and speaks and writes on cyber security. She leads as an International Board Director and Distinguished Fellow for Information Systems Security Association (ISSA); Chairs the board's CISO Advisory Council for the CISO Executive Forum. Debbie is co-founder of the local Cloud Security Alliance chapter.


Shimon N. Oren, Head of Cyber-Intelligence and Threat Analysis, Deep Instinct

Shimon N. Oren is the head of Cyber-Intelligence and Threat Analysis at Deep Instinct. Prior to joining Deep Instinct Shimon served for 14 years as an officer in the Israel Defense Force's elite cyber unit. With a background that includes a wide range of cyber security and research positions, Shimon successfully led multi-functional teams of hackers, researchers and engineers. Some of his accomplishments include developing new methods and tools for the analysis of cyber-campaigns, and leading a product management team in charge of a series of innovative cyber collection capabilities. Shimon has worked extensively with a variety of industry, defense and intelligence partners and agencies in North America and Europe, and is a recipient of the President of Israel Award for Outstanding Military Service. He holds B.Sc (Computer and Electrical Engineering) and MBA (Finance and Tech management) degrees, both with distinction.

Rob Boles, Cybersecurity Expert, Privacy Advocate, President, Blokworx

In 1999, Rob started assisting businesses with computer, network and connectivity to the internet. People didn't know what they needed, how to connect different devices, and why things just didn't "work". For the next 8 years, he was a core technical contributor and presenter on an Advanced IP (Internet Protocol) Team, delivering bleeding edge WAN (Wide Area Network) and Managed Security services to Small, Mid-level and Fortune 500 businesses globally.

The experience working alongside such a wide range of clients led Rob back to the same conclusion, they ALL struggled with the same uncertainty - multiple vendors with infinite solutions, and no real clarity how to make it “work”.

In this engineering role, he saw the big picture, how things fit and inter-operated together, and ultimately the solutions he created solved clients business needs which drove his clients and his own success.

In 2006, Rob created BLOKWORX to further his passion for creating fast, secure networks that provide clients peace of mind. BLOKWORX from day 1 has been focused on security, reliability, and positive user experience. They do this by understanding how things work, extensive research and testing, alignment with their vendors, partners, and clients, and the experience of 1000’s of nodes managed, monitored and maintained, all supported by a mature delivery model built from years of experience. Today there are over 2000 cybersecurity technology companies constantly innovating, and IT leaders are still sifting and sorting assembling the combination that “works". If some certainty in defending your network and your business are of interest, let’s talk.

Community Search
Sign In


ISSA Thought Leadership Series: Is Your Organization Ready for Automation?

3/2/2019 » 3/3/2019
March CISO Forum San Francisco, CA

Member Reception Party at RSA Conference 2019

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information