Cyber Hack Theatre

Wed 5th Oct 13:40 to 14:40

Breaking the Attack Chain

There are many attack vectors by which a hacker can gain access to a computer’s network to exploit system’s vulnerabilities – drive by downloads, social engineering and exploits to name but a few. Attend this presentation to see these threat vectors in action and to see how Malwarebytes adds value at each layer of the attack chain.

What you will take away from this session

  • Understand the threat vectors that can lead to a compromise
  • Understand each layer of the attack chain from profiling to payload execution
  • See how Malwarebytes advanced malware heuristics and behaviour rules detects and blocks zero-hour malicious payloads


Photo Speaker Name Profile
Justin Dolly Justin Dolly View Profile

Social Media



IP EXPO | LinkedIn

The home of IP EXPO Event Series