Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying—that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Digital Extortion & Trend Micro Security Predictions for 2019

  Presented by Trend Micro

Digital extortion has increasingly become cybercriminals’ first and foremost money-making modus operandi. It’s mostly due to ransomware —cybercriminals’ currently most popular weapon of choice, helping them in extorting cash from users all over the world and in hitting big businesses and organizations. This session provides insight from Trend Micro Research’s 2019 Security Predictions on the current threat landscape.

How to Build a SOC with Limited Resources

  Presented by LogRhythm

In a perfect world, your organization would staff a 24×7 Security Operation Center, and have no trouble finding the budget or talent to do so. But the truth is, most organizations can’t afford a 24×7 SOC. The cost of having well-trained analysts onsite at all times outweighs the benefits.

If your organization is making do with an informal Security Operation Center, you may be facing delays in responding to incidents. You may even fear that incidents are going unnoticed. It’s a dangerous situation.

Organizations need to think of security operations as a critical business process. Effective security operations are the first line of defense when it comes to preventing cyberattacks. To accomplish this, organizations need mature programs that leverage people, processes, and technology to rapidly detect and respond to sophisticated attacks.

The purpose of this presentation is to provide you guidance and a framework that you can apply to building, assessing, and maintaining your security operations center to ensure its success throughout the business lifecycle.

Mobile Threat Landscape/Mobile Hacking

  Presented by Symantec

Today’s modern operating systems, like iOS and Android, are designed for ubiquitous and wireless access from anywhere in the world and have very different use cases and security requirements compared with traditional PCs and servers. Mobile devices are on and connected 24/7, and often owned and managed by individuals, dramatically increasing the attack surface relative to PCs. Malicious hackers have shifted much of their attention to these new operating systems that may provide a direct link into large companies with valuable assets worth stealing. Today, their methods are less focused on broad and annoying attacks on consumers and more on targeted attacks on specific individuals in specific organizations who have the right access levels to high-value assets. Well-researched social engineering exploits, combined with system vulnerabilities, make these attacks highly effective, even against smart and educated individuals. Solutions exist that protect companies from mobile cyber-attacks by securing mobile devices, whether owned by the company or the individual, from the entire landscape of mobile threats-including malware, network-based threats, vulnerability exploits and other targeted attacks, without changing the mobile user experience, compromising user privacy or adding extra burden to IT. Today we will discuss the Mobile Threat Landscape, show an example of what a Mobile Threat looks like, and discuss best practices to protect your Mobile Data.

Mitigate Cyber Risks: Visibility & Response

  Presented by RSA, the Security Division of Dell EMC

Cyber-attack risks are more prominent and widespread in today’s digital environment. Organizations struggle to respond to the evolving threat landscape—a challenge compounded by visibility and process gaps created by functional silos. This results in uncoordinated responses to cyber incidents that magnify financial, operational, reputational and compliance risks for businesses. This session will cover recommended steps to gain visibility and mitigate ongoing risk.