Cookie Consent by Free Privacy Policy Generator Update cookies preferences

Understanding Advanced Persistent Threats Webinar

Runtime Integrity
Measurement
Webinar

In this technical session, Jason Rogers, CEO of Invary, is joined by Bryan Smith, a former Technical Director at the NSA, to explore the anatomy of a modern APT, from initial compromise to stealth persistence.​

Jason and Bryan demonstrate an APT in action, showing how advanced threats evade detection from traditional endpoint protection platforms, and establish long-term footholds. The discussion includes detailed analysis of the techniques used and how similar APTs are observed in the wild.​ It concludes with a demonstration of how Invary’s Runtime Integrity platform provides a unique approach to finding APTs, by validating the integrity of systems at runtime.​

Understanding APTs 00:01:19 – 00:04:07 | What APTs are, why they’re used, real-world examples like Volt Typhoon
APT Prevalence and Rising Use 00:04:07 – 00:06:05 | Cost vs. value for attackers, increasing frequency, targeting all sectors
APT Demo Setup 00:06:05 – 00:07:01 | Description of test environment, basis for simulated APT (e.g., Drovorub)
APT Behavior Demonstration 00:07:01 – 00:11:04 | Implantation & In-Memory Techniques
Privilege Escalation, Log Obfuscation 00:11:04 – 00:17:00
Living Off the Land 00:12:27 – 00:14:00
Command & Control 00:14:00 – 00:16:00

Living Off the Land 00:12:27 – 00:14:00
Command & Control 00:14:00 – 00:16:00
File Hiding, Process Hiding 00:16:00 – 00:24:00
Network Stealth and Firewall Evasion 00:24:00 – 00:27:00
Kernel Hijack Techniques 00:27:00 – 00:30:006
Runtime Integrity Detection 00:30:00 – 00:39:00 | How Invary detects changes to kernel memory; JSON output walkthrough
Cross-Platform Threats 00:39:00 – 00:40:00 | Linux, Windows, Mac, Mobile—all are targets
Q&A Session 00:40:00 – 00:44:00 | Endpoint bypassing, attribution challenges, the value of real-time visibility

Articles and Webinars

Articles and Webinars

Vibrint and Invary Join Forces to Advance Kernel-Level Zero Trust Solutions

Press Release

WEBINAR: Understanding Advanced Persistent Threats: Evasion Tactics and Detection Techniques

Watch Now

Integrity: An Overlooked Foundation of Zero Trust

Read Article

WEBINAR: The Necessity of Runtime Integrity - A Panel Discussion on Integrity Measurement and Trusted Mechanisms

WATCH NOW

Why Invary: A Cybersecurity Veteran's Perspective

READ ARTICLE

Runtime Integrity Measurement Overview

READ ARTICLE

eBPF Rootkit or EDR

READ ARTICLE

Improving HPC Incident Response with Runtime Integrity in Elasticsearch

WATCH NOW

Rootkit or EDR

READ ARTICLE

Invary: Breaking the Cycle

READ ARTICLE

How NSA Technology Powers Invary

READ ARTICLE

Formally Verified Bundling and Appraisal of Evidence for Layered Attestations

READ ARTICLE

Flexible Mechanisms for Remote Attestation

READ ARTICLE

Detecting System Compromise

READ ARTICLE

Design and Formal Verification of a Copland Based Attestation Protocol

READ ARTICLE

An Infrastructure for Faithful Execution of Remote Attestation Protocols

READ ARTICLE

Orchestrating Layered Attestations

READ ARTICLE

Invary’s Mission to Ensure the Confidentiality and Security of Systems at Runtime Accelerates with Seed Funding

Press Release