Michael Raggo

Data Hiding — A look at the Latest Techniques and Countermeasures

DateTuesday, November 4, 2014

1pm - New York | 6pm - London | 11:30pm - Mumbai | Wed, Nov 5th at 2am - Beijing | Wed, Nov 5th at 3am - Tokyo | Wed, Nov 5th at 5am - Sydney

Presented by: Michael Raggo

Duration: Approximately 60 minutes.

Cost: Free

As malware grows in sophistication, current techniques reveal that malware variants are employing more covert functions. Additionally, corporate espionage is at an all-time high as evidenced by all of the alleged Chinese cases in 2013. If the newswire is any indication, corporate espionage, covert communications, and evidence concealment continue to plague corporations, investigators, and the military.

This webcast will highlight some of the latest research of the 21st century involving data hiding techniques over the network and with data-at-rest. The highlights will demonstrate new techniques for hiding data on mobile devices, operating systems, VOIP, virtual images, social networks, and other dominating technologies in today's world. Having demonstrated the latest data hiding techniques, detailed analytical methods for enumerating hidden data, as well as jamming methods for disrupting data hiding operations will be outlined. We will then consider emerging technologies and attack methods, including cloud considerations, privacy protection, and derivative data hiding and detection theories.

The concepts will provide corporate, government and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, one can gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.

About Michael T. Raggo

Michael T. Raggo (CISSP, NSA-IAM, CCSI, ACE, CSI), Security Evangelist, MobileIron, Inc. applies over 20 years of security technology experience and evangelism to the technical delivery of Mobile Security Solutions. Mr. Raggo's technology experience includes mobile device security, penetration testing, wireless security assessments, compliance assessments, incident response and forensics, security research, and is a former security trainer. In addition, Mr. Raggo conducts ongoing independent research on various Data Hiding techniques including steganography, as well as Wireless and Mobile Device attack and countermeasure techniques. His publications include books for Syngress titled "Data Hiding" and McGraw Hill as a contributing author for "Information Security the Complete Reference 2nd Edition", as well as multiple magazine and online articles. He is also a participating member of the PCI Mobile Task Force. Mr. Raggo has presented on various security topics at numerous conferences around the world (BlackHat, DefCon, SANS, Gartner, DoD Cyber Crime, OWASP, InfoSec, etc.) and has even briefed the Pentagon and FBI. Twitter @MikeRaggo and @DataHiding mraggo@mobileiron.com

You may also be interested in:

Strata Conference + Hadoop World

Questions? Please send email to