Deep Learning: A Radical New Way to Detect Malware

Presented by Blue Hexagon

The transformative power of deep learning is being applied to every aspect of our lives– from speech recognition and cancer imaging to autonomous driving cars. Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware variants created at unprecedented volume and velocity. In fact, deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time.

In this session, hear about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. Finally, explore a case study of how a multi-vector, polymorphic variant of the Emotet malware was detected with “deep learning inspection”. Deep dive into how the deep learning models were executed on different phases of the Emotet attack kill chain.

A New Era of Data Protection: Converged DR and Backup

Presented by Zerto

In today’s always-on, information-driven organizations, business continuity depends completely on IT infrastructures that are up and running 24/7. Being prepared for any data related disaster is key!

  • The cost and business impact of downtime and data loss can be immense
  • Data loss is not only caused by natural disasters, power outages, hardware failure and user errors, but more and more by software problems and cyber security related disasters
  • Having a plan and process in place will help you mitigate the impact of an outage on your business.

In this presentation we will address the challenges, needs, strategies, and solutions.

Securing the Public Cloud

Presented by Check Point

Securing the public cloud requires a different approach than what was required historically. We need to not only utilize a different design and tools but also shift the security focus to the user and not the location of a device.

Deep Learning: A Radical New Way to Detect Malware

Presented by Blue Hexagon

The transformative power of deep learning is being applied to every aspect of our lives– from speech recognition and cancer imaging to autonomous driving cars. Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware variants created at unprecedented volume and velocity. In fact, deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time.

In this session, hear about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. Finally, explore a case study of how a multi-vector, polymorphic variant of the Emotet malware was detected with “deep learning inspection”. Deep dive into how the deep learning models were executed on different phases of the Emotet attack kill chain.

Secure, Fast & Flexible: Improving Performance with Networking Standards

Presented by JT Tech/Extreme Networks

The digital business is here, and networking is fundamental to its success! The modern enterprise demands agility, scalable and resilient connectivity, and inherent network security – but without the complexity of traditional networking. Advances in networking technology – being driven through standards bodies such as the IEEE and IETF – have dramatically simplified the design, build and operation of the network; delivering automation while at the same time improving security and stability.

Learn from Jamie Eubank, Solutions Architect with over 20 years of experience in large scale, mission critical, campus and sporting event architectures. Specializing in Shortest Path Bridging 802.1aq, Wi-Fi technology (CWNE) and Security Architectures (CISSP/CEH) on new standard-based approaches to network design to help you:

  • Deliver new digital technology and applications to your users & customers faster
  • Avoid lengthy maintenance windows for network moves, adds and changes
  • Contain breaches and prevent lateral movements through end to end segmentation
  • Improve the performance and scale of your most demanding applications (video surveillance, video distribution, patient telemetry systems, etc.)
  • Improve stability and simplify troubleshooting

Administering Responsibly

Presented by One Identity

Managing elevated and shared access credentials is one of the biggest challenges facing complex heterogeneous organizations today. Administrators must be able to access the systems they manage with sufficient rights to do their jobs, but organizations must control that access to ensure security and regulatory compliance. The days of administrators sharing accounts and passwords and operating without auditing are gone (or they should be).

Large enterprises face unique challenges. They too must control the use of elevated privileges, but they need to find ways to enhance authentication for these accounts to meet mandates while still enabling administrators to administer. Even with multifactor authentication to “check out” a privileged account or session, we still need to take steps to mitigate potential account compromises–making sure the admin that authenticated today is still who they say they are. We’ve come to the point where we need to continuously analyze administration by watching normal behavior and comparing it to current behavior – with real-time in-line remediation to add a powerful layer of risk mitigation.

PCI and Your Organizational Liability

Presented by Structured

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants.

Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Innovation and Evolution: BC/DR for Today’s Multi-Cloud Environments

Presented by Unitrends

We are living in a “Less is More” world. In a landscape that’s rapidly changing, IT professionals are managing more work, projects, and risk than ever before. While external threats such as malware and natural disasters cause significant downtime and data loss without proper BCDR implementation, organizations must also be prepared to safeguard from within. Data continues to grow at an exponential rate, and not only on-premises. As cloud-delivered solutions such as IaaS and SaaS are rapidly adopted by an increasing number of organizations, and the workforce itself is becoming increasingly dispersed and mobile, organizations must consider data protection strategies to address gaps in BC/DR outside the traditional data center. Join Adam Marget, Technical Specialist from Unitrends, as we explore the evolving landscape of data protection, cloud’s growing role, BC/DR strategies to safeguard local, remote, and cloud-based workloads, and best practices in planning your DR approach.

Fighting Cybercrime with Artificial Intelligence

Presented by Fortinet

In this session you will learn how we are using modern A.I. and machine learning to assist in threat research. Additionally we’ll discuss the evolution of threat research/methodology and how global collaboration leads to enhanced protection for everyone.