Date: November 5, 2015 at 7 p.m.
Location: Algonquin College (Woodroffe Campus), room B185
Note This meeting is at the Woodroff campus of Algonquin in Building T, room T-317 at 7:00pm
This month we will be having a single talk on malware reverse engineering. The talk will be filled with examples and may go on for an extended period, depending on audience interest..
There will be a one hour pre-meeting item from 18:00 to 19:00 for people who are new to Linux, have general questions, or wish to help out with people who are just getting started.
After Meeting Social:
After the meeting, there will be a social event at one of the nearby pubs or restaurants. A short discussion and vote as to location will be taken then.
After the main talk there will be the opportunity for a GPG key signing. This is a monthly offering, just look for Scott after the talk and we can go from there. Bring some kind of photo ID and some keyslips if you expect people to sign your key.If you need some method of creating pages of keyslips, there is an online slip generator available.
Speaker: Patrick Malcom
Most intrusions involve some form of malicious software. When investigating an incident, the responder typically seeks to answer questions such as: Which systems are affected? What actions can the malware specimen perform on the system? How does it spread? How does it maintain contact with the attacker? These questions can all be answered by analyzing the malware.
Patrick Malcolm will demonstrate how malware reverse engineering can support the efforts of those pursuing adversaries employing malicious code in their trade-craft.
Patrick Malcolm, President of NetRunner is a trusted educator to clients like: the Department of National Defence, Canadian Security Establishment, IBM, The Royal Bank of Canada, the RCMP High Tech Crime Unit, Canadian Police College. An entertaining and knowledgeable storyteller, Patrick combines compelling storytelling with technical facts that engage and give participants a memorable experience.