Data Hiding — A look at the Latest Techniques and Countermeasures
Date: This event took place live on November 18 2014
Duration: Approximately 60 minutes.
As malware grows in sophistication, current techniques reveal that malware variants are employing more covert functions. Additionally, corporate espionage is at an all-time high as evidenced by all of the alleged Chinese cases in 2013. If the newswire is any indication, corporate espionage, covert communications, and evidence concealment continue to plague corporations, investigators, and the military.
This webcast will highlight some of the latest research of the 21st century involving data hiding techniques over the network and with data-at-rest. The highlights will demonstrate new techniques for hiding data on mobile devices, operating systems, VOIP, virtual images, social networks, and other dominating technologies in today's world. Having demonstrated the latest data hiding techniques, detailed analytical methods for enumerating hidden data, as well as jamming methods for disrupting data hiding operations will be outlined. We will then consider emerging technologies and attack methods, including cloud considerations, privacy protection, and derivative data hiding and detection theories.
The concepts will provide corporate, government and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, one can gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
About Michael T. Raggo
Michael T. Raggo (CISSP, NSA-IAM, CCSI, ACE, CSI), Security Evangelist, MobileIron, Inc. applies over 20 years of security technology experience and evangelism to the technical delivery of Mobile Security Solutions. Mr. Raggo's technology experience includes mobile device security, penetration testing, wireless security assessments, compliance assessments, incident response and forensics, security research, and is a former security trainer. In addition, Mr. Raggo conducts ongoing independent research on various Data Hiding techniques including steganography, as well as Wireless and Mobile Device attack and countermeasure techniques. His publications include books for Syngress titled "Data Hiding" and McGraw Hill as a contributing author for "Information Security the Complete Reference 2nd Edition", as well as multiple magazine and online articles. He is also a participating member of the PCI Mobile Task Force. Mr. Raggo has presented on various security topics at numerous conferences around the world (BlackHat, DefCon, SANS, Gartner, DoD Cyber Crime, OWASP, InfoSec, etc.) and has even briefed the Pentagon and FBI. Twitter @MikeRaggo and @DataHiding firstname.lastname@example.org
About Chet Hosmer
Chet Hosmer is the Founder of Python Forensics, Inc. a non-profit organization focused on the collaborative development of open source investigative technologies using the Python programming language. Chet is also the founder of WetStone Technologies, Inc. and he has been researching and developing technology and training surrounding forensics, digital investigation and steganography for over two decades. He has made numerous appearances to discuss emerging cyber threats including National Public Radio's Kojo Nnamdi show, ABC's Primetime Thursday, NHK Japan, CrimeCrime TechTV and ABC News Australia. He has also been a frequent contributor to technical and news stories relating to cyber security and forensics and has been interviewed and quoted by IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com and Wired Magazine.
Chet also serves as a visiting professor at Utica College where he teaches in the Cybersecurity Graduate program. He is also an Adjunct Faculty member at Champlain College in the Masters of Science in Digital Forensic Science Program. Chet delivers keynote and plenary talks on various cyber security related topics around the world each year. He is the co-author of the Syngress Books: Data Hiding, Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols and Python Forensics, A workbench for inventing and sharing digital forensic technology
You may also be interested in:
Questions? Please send email to