Data exfiltration has been a hot topic on the past year, in light of the "APT" attacks that took frontstage in the media. However, the attacks that we keep seeing are not even close to what really is going on behind the scenes, where sophisticated exfiltartion techniques are being used to grab data out of highly secure networks.
This talk will cover both the infiltration techniques used in red-team engagements, and government related cyber-preparedness capability building, as well as the command & control mechanisms for such attack software. On top of that, the talk will show innovative exfiltration techniques that go much beyond the case-studies shown over the past year as "advanced" and will challenge the industry with how it perceives its data monitoring and security.