Back to Top

Workshop Registration Details


395314

A Defender's Guide to Process Injections

Complete Attendance not available before workshop starts.

You spend your time hunting for evil.exe, but what about the ghost hiding inside a process you already trust? This session deconstructs process injections, the adversary's go-to technique for evading modern defenses. We'll explore how attackers hijack trusted applications and run malicious code directly from memory. You'll leave with a strong conceptual model for hunting these elusive threats, moving beyond simple process monitoring to spot the subtle behaviors of a compromised system.

LEA, Higher Ed, City and County IT Leaders and educators.

$0.00

60

1

4

1

No

Conference
Cyber / Information Security

...There are no COOPs...

Workshop Materials

Title
...There are no workshop materials...

Dates, Times and Locations

Room Name Workshop Date Begin Time End Time
Education Service Center
Cameron County Room
10/30/2025 2:00 PM 2:55 PM

Workshop Contacts

Name Type E-Mail Phone
Matthew Navarro Presenter matthew@rgv-cyber.org
Armando Villarreal Contact armavillarreal@esc1.net
Homar Venecia Contact hvenecia@esc1.net
Armando Villarreal Billing Contact armavillarreal@esc1.net

Special Accommodations
For requests for special accommodations for this workshop, please contact one of the individuals listed above at least ten(10) business days prior to the workshop date.