ISC8 Cyber Security Engineering Head Jim Deerman to Present on Advanced Malware Detection at Security and Audit Conference


October 22, 2013

ISC8 Cyber Security Engineering Director Jim Deerman to Present on Advanced Malware Detection at Phoenix Security and Audit Conference 

WHAT:            “Advanced Malware Detection through Attack Life Cycle Analysis”

WHEN:             Tuesday,October 22, 2013

WHERE:           Phoenix Security and Audit Conference (PHX SAC) 2014
                       Desert Willow Conference Center, Phoenix, Arizona

WHY:               With the onslaught of modern cyber-attacks on high profile and high value targets, it is apparent that the state of information security is critically lacking in this new environment. Computers and personal devices are becoming increasingly network-oriented, and the strategies and behaviors of modern malware have evolved to focus attacks on inter-connected networked systems. The cyber security tools for countering threats and mitigating risk have become ineffective and outdated. Advanced malware, particularly APTs (advanced persistent threats) can no longer be stopped at the perimeter; only by monitoring the core network and identifying malicious activity that maps the phases of an attack, can the malware be detected before it can carry out its mission. 

This presentation provides a brief history of how malware has evolved, the lifecycle of advanced malware and outlines a unique solution to combat current and future generations of APTs. This integrated system uses forensic technology to monitor and analyze internal network traffic and detect low-level suspicious traffic that could signal malicious activity. This solution has been deployed and is proving to be a crucial asset in the protection of critical data in various vertical markets, including financial, medical and telecommunications.. 

WHO:               Jim Deerman, Director, Cyber Security Engineering ISC8

Jim Deerman is director of cyber security engineering for ISC8, a company actively engaged in the development and sale of intelligent cyber security solutions for commercial and government environments worldwide. Jim has over 30 years of extensive experience in network architecture, design and implementation. In his position with ISC8, Jim is heavily involved with network/system security, enterprise data networks, and VoIP networks.

About ISC8

ISC8 is actively engaged in the development and sale of intelligent cyber security solutions for commercial and government environments worldwide. ISC8’s cyber products are aimed at detecting next-generation malware and Advanced Persistent Threats (APTs); providing real-time Big Data security analytics to identify perpetrators; and preventing critical data loss. ISC8 provides hardware, software and service offerings for Malware Threat Detection. ISC8 is a global company with resources in Europe, the Middle East, and Asia Pacific. For more information about ISC8 visit

ISC8 Statement under the Private Securities Litigation Reform Act

This release may contain information about future expectations, plans and prospects of ISC8's management that constitute forward-looking statements for purposes of the safe harbor provisions under the Private Securities Litigation Reform Act of 1995. Actual results may differ materially from those indicated by these forward-looking statements as a result of various important factors including, but not limited to, competitive forces, general economic, market or business conditions, the effects of any attempts to intentionally disrupt our services or network by hackers or others, changes in ISC8's technologies such that they are no longer inter-operable, failure of customers to adopt, or delays in their adoption of, ISC8 products or services discussed above, and other factors, most of which are beyond ISC8's control, as well as those discussed in the Company's Annual Report on Form 10-K, quarterly reports on Form 10-Q, and other documents periodically filed with the SEC. Except as required by law, we undertake no obligation to revise or update publicly any forward-looking statements for any reason.

About Phoenix Security and Audit Conference (PHX SAC) 2014

This combined ISSA, ISACA, and IIA event provides multiple sessions of content along seven specific tracks as well as a morning keynote speaker and a lunch keynote speaker. Session tracks include:

• Intro to IT Audit

• Mobile Technologies

• Hackers & Threats

• Hot Topics

• Securing the End User

• Risk Management

• Soft Skills

For more information, visit ISACA (Phoenix Chapter).

Contact Information

Lizbeth Dison

Calysto Communications

404-266-2060 x519 

[email protected]