[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team

[1 CPE] Mental Malware: Social Platforms and the Dawn of the Disinformation Age

  Presented by Michael Manrod • Chief Information Security Officer, Grand Canyon Education

In recent years, we have seen our world reshaped dramatically as technology has worked its way deeper into our daily lives. As mobility and social platforms reshape how we interact, the speed of information has accelerated, all while the overall trustworthiness of information has deteriorated. In this talk, we will examine human processing flaws that can be exploited via disinformation campaigns (Mental Malware), along with ways such campaigns may be interrupted.

Mike Manrod presently serves as the Chief Information Security Officer for Grand Canyon Education, responsible for leading the security team and formulating the vision and strategy for protecting students, staff, and information assets across the enterprise. Previous experiences include serving as a threat prevention engineer for Check Point and working as a consultant and analyst for other organizations.

Mike is also a co-author/contributor for the joint book project Understanding New Security Threats published by Routledge in 2019, along with multiple articles and whitepapers. When he’s not working, he spends time playing video games with his kids or doing projects around the farm.

[1 CPE] Challenge the Threat of Ransomware: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • Steps you can take to reduce the likelihood of attacks on your system
  • How to choose a best-in-class recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recover quickly
  • Real example of a company hit twice by ransomware and how they improved recovery time from weeks to minutes by planning ahead

[1 CPE] Communication Breakdown

  Presented by INTERFACE Advisory Council

How difficult is it to communicate? This may sound like a rhetorical question, but it does pose challenges. IT departments are frequently in the middle of executing a business plan while the communication falls to others. Technology professionals are now responsible for facilitating improved communication between C-Suite, End-users, and the public.

Please join the INTERFACE Phoenix Advisory Council for a discussion on the challenges of the current communication landscape in your company. Firms of all types and sizes struggle with ensuring that all interested parties have the needed information to perform their jobs. IT departments must lead the way in evolving modern, efficient communication regarding policy, security, procedures, and other operating aspects of the business. Bring your questions for this open conversation with area leaders who will share their experiences and insights.

  • Lester Godsey, Chief Information Security Officer, Maricopa County
  • John Kullman, Sr Manager, Network, Yuma County
  • Patrick O’Keefe, Head of Global Cyber Security and Risk Management, Circle K
  • Lynne Pizzini, Director, Security Governance, Assurance, and Design, CIT Bank

[1 CPE] Silos are for Grain, Not Information

  Presented by INTERFACE Advisory Council & ARMA Arizona

Fifty years ago, the corporate Records and Information Management (RIM) department dealt with paper, file cabinets, and boxes in warehouses; microfiche was considered high-tech. The Information Technology (IT) department ran a mainframe computer in the basement that crunched financial numbers; a terminal in the cashier’s office was considered high-tech. And never the twain would meet. Today, such segregation of corporate functions is not only unnecessary, but it could also be counterproductive or even dangerous. RIM and IT represent distinct, and equally valuable, “mindsets,” but they must work together with Privacy, Security, Compliance, Legal, Human Resources, and even Marketing under comprehensive Information Governance (IG) and Information Lifecycle Management strategies. These strategies align all aspects of data creation (capture), gathering (collaboration), management (retention/storage), circulation (version control), security, legal holds/discovery, and final disposition or archiving with organizational mission, policies, and goals.

Three members of the Arizona chapter of the Association of Records Management and Administration International (ARMA), representing three different types of organizations, discuss how RIM and IT can break down legacy silos and work together to achieve information governance – and the value of ARMA membership.

  • President, ARMA Arizona | Mark MacFarlane, Manager, Enterprise Records and Information Management, Cambia Health Solutions
  • Vice President, ARMA Arizona | Tanesha Charity, Manager, Administrative Services, Valley Metro
  • Vice President for Programs and Education, ARMA Arizona | Ken Withers, Deputy Executive Director, The Sedona Conference®

[1 CPE] Navigating Today’s Threat Landscape: A Current State of Cybersecurity

  Presented by Fortinet

Join this session for a comprehensive look at the current state of cybersecurity. Today’s ever-evolving threat landscape requires an integrated, automated approach to security. Learn how you can mitigate risk in your organization, optimize your security team’s operations, and gain best practices to integrate and consolidate your security tools; whether you’ve taken a multi-vendor or single-vendor approach.

[1 CPE] Breaking the Ransomware Attack Chain

  Presented by Guardicore, now part of Akamai

Despite consistent increases in security spending, ransomware remains an ever-growing threat to businesses. Surprisingly, the ransomware itself, the malware that does the encryption, is only a part of a larger, equally dangerous, attack chain. Considering the entire chain offers defenders more opportunities to thwart the attack before mass encryption can occur.

In this session, we’ll provide details on how microsegmentation can prevent adversarial techniques that precede and follow the deployment of ransomware itself. By turning our attention to the entire kill chain, a path towards minimizing the likelihood, impact, and recovery time of ransomware becomes clear.

In this session you will learn:

  • Practical steps you can take to disrupt the kill chain before ransomware can be deployed
  • How to leverage AI to map complex environments and expedite the path towards policy enforcement that drastically reduces the impact of ransomware
  • How advancements in host-based segmentation are helping businesses achieve an infrastructure that enables rapid remediation of ransomware events without disrupting business operations

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

[1 CPE] Protecting Your Critical Data

  Presented by Optiv & Rubrik

Businesses today rely heavily on technology and data. Though most organizations have developed strategies to access critical data during an outage caused by natural disasters or power disruptions, these strategies are ineffective during a cyber attack. Interconnected users, servers, cloud devices, and continuous web access results in an environment that is open for cybercriminals to significantly disrupt operations and/or take an entire network hostage.

How can you support the identification and protection of critical data that must be shielded from the impact of cyber attacks, while also enabling rapid recovery to a secure state? Join us to learn how you can automatically store backups in a malware-protected, air-gapped vault or a remote cloud-based solution that safeguards your data’s confidentiality, integrity, and availability. We’ll discuss how you can ensure your data is verified and clean before entering the vault and is maintained in an immutable state while within the vault, significantly reducing recovery time by guaranteeing that you are recovering to a known good state.