Loading…
FloCon 2019 has ended
Thursday, January 10 • 9:30am - 10:00am
Quantum Approach to Inverse Malware Eradication

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
A quantum approach to malware eradication addresses the needs of organizations, which are facing a shortage of cybersecurity staff and resources, to tackle the increasing and dynamic cyber threat they are facing in a distributed and mobile computing environment. This approach closes the existing security gap and provides entities with a layer of security and protection between end-user and the Internet. It also provides a new sensing capability to provide a novel vantage point for threats in near real-time while sharing that visibility through standardized methodologies. The quantum approach to malware eradication inverts current common practices through the rewrite of binaries and documents to drive inbound and outbound files into compliance with permitted behaviors—an organization’s pre-established file risk parameters. This approach borrows from a variety of reductionist models introduced over the last few decades across the physical, biological and social sciences to analyze, describe and at times control the emergent properties of complex adaptive systems at their most fundamental, constituent levels. Positing that a file, including its content and behavior, emerges from the complex interactions of its constituent parts, the approach reduces it to predictable building-blocks and then regenerates them in accordance with a controlled, pre-established rule set without an impact to content, but with risk-based behavior controls. Interdicting files before they reach an endpoint, the quantum approach offers the opportunity to significantly reduce the vulnerability introduced into enterprises by the human user who is susceptible to a variety of social engineering attacks. It is the ultimate “left of boom” method that eliminates as much malware as all retroactive detection methods combined with no human interaction. Combining these methods is the future. It is scalable such that small- and medium-sized organizations can afford it, and it is flexible such that it can be applied across multiple use-cases.

Attendees will Learn:
​​​​Quantum rewrites of binaries and documents to support permitted behaviors is the inverse of malware response where content needs to be detected, analyzed and/or detonated. It is the ultimate “left of boom” method that eliminates as much malware as all retroactive detection methods combined with no human interaction. The goal is to inform the attendees that using a 'pass only known good' methodolgy through a quantum approach simplifies the solution and the future of information security will benefit from an inverted approach to security.

Speakers
avatar for Daniel Medina

Daniel Medina

Director, Strategic & Technical Engagement, Glasswall Solutions Inc.
Daniel V. Medina is currently the Director of Strategic and Technical Engagements at Glasswall Solutions Inc. In his current role, Mr. Medina is responsible for developing and leading strategic engagement, thought leadership, and business development for Glasswall Solutions Inc... Read More →
avatar for Matthew Shabat

Matthew Shabat

U.S. Strategy Manager, Glasswall Solutions
Matt Shabat is the U.S. Strategy Manager for Glasswall Solutions. He served for nearly 10 years in the U.S. Department of Homeland Security's Office of Cybersecurity and Communications, most recently as a cybersecurity strategist and as the Director of Performance Management, and... Read More →



Thursday January 10, 2019 9:30am - 10:00am
Grand Ballroom 300 Bourbon St, New Orleans, LA 70130

Attendees (20)