March 15, 2011

 

Memory Forensics: Collecting and Analyzing Malware Artifacts from RAM
by
Inno Eroraha
NetSecurity Corporation
 

 


Abstract
Today's malware are very sophisticated and difficult to detect, capture, and analyze. This presentation shares some of the best practices and latest tools for capturing system memory and analyzing the image for malware artifacts. The session will be heavily hands-on in nature. At the end of the presentation, participants will be armed with the right arsenals for quickly extracting malware specimen from RAM and conducting deep analysis on the malicious software strain.


About the Speaker
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation. He delivers cyber security and computer forensics solutions, teaches Hands-On How-To(r) Security/Forensics courses, and oversees the state-of-the-art NetSecurity Forensic Labs. He has delivered keynote speeches at industry conferences such The Computer Forensics Show and Techno Security and Digital Investigations conferences. Mr. Eroraha graduated cum laude with dual bachelor degrees in mathematics and computer science from Morgan State University as well as a masters degree in computer science from The George Washington University. Mr. Eroraha possess professional certifications including: CISSP, ISSAP, ISSMP, CISM, CISA, CHFI, CCSE, and CCSA. He is a licensed Private Investigator (PI) in the Commonwealth of Virginia.

 

Please RSVP if you plan to attend.

Tuesday, March 15, 2011 6:30 PM

Government Printing Office
Room A138
732 N. Capitol St.
Washington, DC, 20401

Click here for details