Living off the Land / Living off the Orchard Techniques

Organizations today are running multiple environments such as on-premises (corporate), Cloud, and Hybrid, across different operating systems like Windows, Linux, MacOS, etc. This means there is a lot going on, and it requires a proper protection and understanding across multiple layers. The attackers’ techniques have evolved with time and technology. Instead of introducing malicious code or a new external file, they use existing applications, tools, and processes. This allows them to camouflage their existence.

--

--

Aakif Shaikh, CISSP, CEH, CHFI, CISA, GWAPT

Over 18 years of experience in a wide variety of technical domains within information security including information assurance, compliance, and risk management.