[1 CPE] 2022 Threat Review

  Presented by Malwarebytes

The Malwarebytes 2022 Threat Review is an annual report on the latest threats, attack trends, and privacy breaches impacting individuals, organizations, and national security. Researchers detail threat intelligence across operating systems and examine how privacy has shifted and the ways that cybercriminals and crimes are evolving. With a stronger understanding of the threat landscape, organizations and individuals can make more informed security and cyber-protection decisions.

[1 CPE] What is “Universal Zero Trust Network Access” for IT and OT Environment?

  Presented by Airgap

Hybrid workforce is forcing IT to manage two sets of access products for remote work and for in-office work. This inefficiency leads to higher costs, operational complexity of managing duplicate policies, and different experience for on-prem and remote workers. Why must IT organizations deal with VLANs, ACLs, port, 802.1x, NACs and their configurations for when your employees are on-premises versus when the employees are working from remote locations?

In this session, you’ll learn the key principles of Universal Zero Trust Network Access and how a unified stack across hybrid workforce can reduce operational complexities, improve user experience, and reduce downtime for IT and OT organizations.

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team

[1 CPE] Asset Visibility is Foundational to Effective Attack Surface Management

  Presented by Armis

Organizational assets are everywhere, across any network, and with diversified asset types like IT, IoT, OT & IoMT. Today’s organizations struggle to manage this extended attack surface, leaving unseen gaps in risk posture. So why is it that in 2022 organizations still fail to instantly and accurately answer basic questions of what they have, never mind understanding risks and threats across the heavily expanded footprint? Is it the manual effort to find and understand the asset landscape or that existing tools are only focused on a particular asset types like IT? Join Armis for this informative session where we’ll explore what the expanded attack looks like and how to address the increased threat that most organizations face.

[1 CPE] Stopping Attacks, Not Your Business: AI & Autonomous Response

  Presented by Darktrace

With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. Join this session to explore the benefits of Autonomous Response as a must-have that goes beyond ‘defense,’ including real-world threat finds and attack scenarios.

[1 CPE] The Future of Observability

  Presented by Cribl

Digital transformations, cloud migrations, and persistent security threats turned observability from a niche concern to an essential capability in today’s organizations. We’re still in the early days of observability maturity, but early stumbles point to where observability must go in the future. This talk discusses where observability is today and the three critical areas necessary for observability to deliver on its promises throughout the enterprise.

[1 CPE] The Good, the Bad, and the Ugly of Vetting Applications

  Presented by Eric Walters • Chief Information Security Officer, Burns & McDonnell

What level of access are applications requesting and then receiving directly from your employees? Is the security team aware? Has the risk been quantified? Who is looking at the application Terms and Conditions or the End User License Agreement? Is the access overly permissive? What happens if the application vendor is hacked? Can the attacker access your data? Is the vendor liable?

Eric Walters, CISO and Director of IT Operations at Burns & McDonnell, will discuss these and many more perils and pitfalls of vetting applications and plugins.

Eric Walters is a seasoned information technology leader with over 25 years of security experience. He is capable of translating IT details into executive-level business decisions. Eric believes good compliance does not mean good security, nor does good security mean good risk management. Passionate for employee development. His experience includes healthcare compliance, software development, information security program management, cyber security managed services, global transition operations, infrastructure cloud operations, enterprise architecture, and document management, and is a retired Marine Officer.

[1 CPE] Disrupting the Means to Prevent the End: A Guide to Detecting Ransomware

  Presented by Red Canary

Ransomware has been a dominant cybersecurity threat for the better part of the last decade. However, it doesn’t walk alone. It’s almost always the eventual payload delivered by earlier-stage malicious software or activity. Luckily, if you can detect the threats that deliver the ransomware, you can stop the ransomware before it arrives.

In this talk, we’ll extensively reference Red Canary’s 2022 Threat Detection Report, examining the malware and other malicious tools that adversaries often use to deliver ransomware. While the specific trojans and strains of ransomware may change from one attack to the next, adversary tactics, techniques, and procedures are often similar across campaigns and threats. By developing robust detection coverage for the techniques adversaries abuse most often, rather than focusing on individual threats, security teams can achieve defense-in-depth against the many threats that leverage those techniques and the broader trends that dominate the infosec landscape.

Want to learn more about the prevalent adversary techniques and threats that can lead to a ransomware infection? Attendees will leave with:

  • A better understanding of the threats and tools that commonly precede a ransomware infection
  • Guidance on relevant collection and data sources that offer visibility into the threats and techniques that adversaries use to deliver ransomware
  • Actionable information on how security teams can develop the capacity to detect, prevent, and mitigate ransomware and other threats
  • Strategies for testing their ability to observe and detect common threats with free and easy-to-use tools like Atomic Red Team