About the Meeting
Jimi Mills from the Texas Instruments (T.I) Security Operations Center will be presenting an enterprise IT perspective on malware and infection paths with examples from a network security monitoring view including analysis and tools. This walkthrough will include examples of packet captures, implementation of tools such as Suricata IDS, and extracting and analyzing binaries from packet captures. Also, we will be covering StegSolve during tooltime this week.
Texas Instruments Slides https://drive.google.com/file/d/0B0N05FlOnPXWaC1sSzNaekZFSzA/view?usp=sharing