I should have posted this content here as well.
So, the presentation has a different twist on what I have wrote in the whitepaper. I started building the understanding about Mac security in my introduction, as I lead the context to analysis at the specific threat families. Then followed by taking the macro analysis by broadening the perspective into attackers’ underlying business models, the competitive advantages it brings while constructing the means, motive and how these aspects build and created opportunity that enables these organize group to perform and deploy threats and attacks to Mac users.
While the momentum of interest and excitement increases, my presentation suddenly froze and crash report pops-up. Indeed, an ice breaker as I continue to deliver the remaining slides.
At the end, the presentation shared some actual infection report and showed data how successful these threat into penetrating in this platform.
It was a great experience and same time meeting fellow researchers in this conference!