Presented by Secureworks
Why make the same mistakes others have already made? Using real-life examples of missteps made by other companies, you will learn what you can do to have a successful penetration test and maximize learnings.
Presented by Secureworks
Why make the same mistakes others have already made? Using real-life examples of missteps made by other companies, you will learn what you can do to have a successful penetration test and maximize learnings.
Presented by Fortinet
Securing connected resources and the different pieces of a distributed network can be challenging. Join this session to explore the advantages of using SASE and a ZTNA architecture to provide secure, application-based access over the traditional VPN access most enterprises use today. We’ll also examine how employing Gartner’s Cybersecurity Mesh Architecture can simplify Network and Security operations.
Presented by Red Canary
Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.
In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.
Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:
Presented by Collin Miller • Director of Cloud Security, Structured
Responding to a security incident requires preparation, planning, and processes. When that incident occurs in a cloud environment such as Azure, not all organizations are equipped to respond. The shared responsibility model, rapid rate of change, high degree of automation, and new security tools and technologies all present challenges and opportunities when responding to incidents in the cloud. Protect your organization’s information, applications, and reputation by learning to develop an incident response infrastructure to prepare, detect, analyze, contain, eradicate, recover, and learn from security incidents when they occur. This presentation will focus on Azure environments, but many of the lessons learned are applicable across the major cloud service providers.
Collin Miller has over two decades of experience in networking and IT security. In 2015 he hiked over 2,600mi on the Pacific Crest Trail from the Mexican border into Canada. His security journey has seen him working with a wide array of cybersecurity technologies including network security, securing mobile devices, and data loss prevention. His current area of focus is cloud security.
Presented by Darktrace
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen and to recover if compromised. In this session, we’ll unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
Presented by Hitachi Vantara
If an attack happens and it makes it all the way to your data, then they have already broken through all of your walls. Where your data lives IS your last line of defense, which is why the Armed Forces that protects the USA trusts Hitachi to protect them. Prevention is great and all but without that last line of defense, you’re a sitting duck. Attend this session to learn how Hitachi serves as your last line of defense against ransomware attacks.
Presented by Infoblox
While the future economic impact on IT budgets is unclear, one thing is clear: attackers will not slow down and may even ramp up knowing organizations are considering lowering IT and cybersecurity spending. It is clear enterprise security is of extreme importance and making investments stretch is going to become essential. Core network services you already have in place, including DNS, DHCP, and IPAM (IP Address Management) are often overlooked in the cybersecurity world but can become the most powerful weapon against attackers. During this session, you will learn how to leverage existing services to:
Presented by Arctic Wolf
When searching for vulnerable targets, cyber hackers do not care how big or small your company is. As world events continue to unfold in China and Russia, cyber warfare has become a national threat to American companies.
Join Arctic Wolf’s session to learn how IT leaders can be proactive, rather than reactive to protect their companies from cyber hackers.
Presented by Rubrik
Organizations have invested heavily in IT security, attempting to fortify their perimeter, network, endpoint, and application protections. Despite these investments, hackers are successfully penetrating these defenses and targeting enterprise data, including backup data. Ransomware is starting to specifically target online backups by encrypting or deleting them. If your organization was the target of an attack today, how do you know what data was impacted and where? Manually sifting through millions of files and comparing each snapshot consumes FTE time and prolongs recovery exponentially. Mass restores of the entire environment could mean high data loss and weeks’ worth of work down the drain. In this session, we will discuss how to protect your last line of defense, the backups. We will walk through the anatomy of a recovery, the best practices, and advanced tools to ensure you will not have to pay a ransom, and how to quickly recover your data to continue business operations.
Presented by Akamai
Despite consistent increases in security spending, ransomware remains an ever-growing threat to businesses. Surprisingly, the ransomware itself, the malware that does the encryption, is only a part of a larger, equally dangerous, attack chain. Considering the entire chain offers defenders more opportunities to thwart the attack before mass encryption can occur.
In this session, we’ll provide details on how microsegmentation can prevent adversarial techniques that precede and follow the deployment of ransomware itself. By turning our attention to the entire kill chain, a path towards minimizing the likelihood, impact, and recovery time of ransomware becomes clear.
In this session you will learn:
Join Speaker Chris McIntosh, GCSA/GCSE SE Akamai Segmentation