Joshua St.Hilaire is currently a Principal SecurityResearcher at Vectra where he currently leads research on adversarial detection models. He has twenty years of experience in computer security focused on incident response, threat hunting and reverse-engineering.
Joshua St. Hilaire
Network and endpoint defense technologies will have to either rapidly update signatures or use other investigative ways to detect command and control (C2). Uncover how threat actors evade security tools to execute C2 techniques to learn about what you should look for.
550 S. Winchester Blvd., Suite 200
San Jose, CA, USA 95128
© 2022 Vectra AI, Inc. All rights reserved.