[1 CPE] Cyber Attack Responder Viewpoints

  Presented by Jeremy Wilson • Deputy CISO, State of Texas

This session will cover lessons learned from the State of Texas’ Cybersecurity Program. We will focus on how to prepare for and respond to a cybersecurity attack. There are plenty of low and no-cost options and activities that can help your organization prepare. We will provide additional information and services specifically for governmental entities in the State of Texas, but other organizations will still find value in our approach and how we deal with different types of attacks from Nation-State Advanced Persistent Threat (APT) actors to opportunistic hacktivists.

[1 CPE] Stopping Ransomware with Autonomous Response

  Presented by Darktrace

Join Brianna Leddy, Darktrace’s Director of Analysis, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.

[1 CPE] Stopping Zero-Day Ransomware with Autonomous Incident Response

  Presented by Airgap

New strains of ransomware are leaving organizations vulnerable and show no sign of slowing down; security teams are unable to respond proportionately to an attack, leading to cyber disruption across the organization. This can affect all industries including manufacturing, critical infrastructure, healthcare, or any organization like yours and mine.

Join this session to unpack some of 2022’s most advanced ransomware threats and their behavior. Also, you can learn how to fix network flaws from the core for connected OT/IT/IoT, and stop lateral threat movement in every stage of the Cyber Kill Chain. If you have concerns about Zero-Day exploits or are assigned with Zero Trust initiatives, don’t miss this opportunity to learn how you can take autonomous action with 24/7 availability to stop the threat on its track. We’ll discuss:

  • Recent ransomware threat trends, including double extortion and RDP attacks in OT and ICS
  • How Autonomous Response takes DEFCON action to contain an emerging zero-day attack unattended with Zero Trust policy enforcement
  • Real-world examples of ransomware detection through agentless segmentation and containment

[1 CPE] Automated Enforcement Advances: Protecting Against Ransomware

  Presented by Illumio

Attackers are continuing to successfully set off cyber disasters across the globe. Organizations that focus solely on detection and response find that they can’t detect or respond fast enough. Cyberattacks and ransomware break through perimeters and then leverage common ports to stay undetected until they have spread throughout an organization.

There are new advancements that allow organizations to protect their key assets from cyberattacks and ransomware in minutes – across multi cloud, containers, hybrid and on-premises environments.

We’ll discuss how these innovations can help you:

  • Immediately enforce security policy across your organization to protect high-value assets.
  • Dramatically reduce the risk of supply-chain attacks like the recent Kaseya ransomware.
  • Scale as needed to enforce more than 100,000 workloads in cloud, hybrid, and on-premises environments.
  • Get real-time visibility and insights to create, enforce, and test security policy.
  • Monitor workloads in and out of applications hosted in public clouds to simplify and secure cloud migrations and automate multi-cloud security.

[1 CPE] Security vs. Compliance: Turning InfoSec Success into Audit Wins

  Presented by Tripwire

Security and compliance teams both strive to design, establish, and enforce controls to protect an organization. But even with shared goals in place, security and compliance teams often manage business risk in relative isolation. So how can these teams set aside tension and work better together to create a winning alliance?

In this session, we explore the key differences between security and compliance initiatives. It’s crucial to understand that being fully compliant doesn’t necessarily mean an organization is fundamentally secure. We’ll cover how the two initiatives complement each other when it comes to minimizing risk and how both teams can collaborate to create efficiencies. Attendees will learn how to leverage compliance policies to set the foundation to a robust information security program, while providing true visibility and coverage, consolidating toolsets, and reducing costs. Lastly, we’ll discuss how to ensure that a successful security program can help organizations prepare for an upcoming audit to ultimately achieve and maintain continuous compliance.

[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

[1 CPE] Lessons to Share: An Expert’s Guide to Ransomware Remediation

  Presented by Brian Miller • Co-Founder and CEO, FusionTek

If ransomware makes it past your front line of defense, what’s your next move?

Many businesses get caught in situations where they believe the classic line “this will never happen to me.” That may be true until it does happen to them. From there, a series of unfortunate events will unroll, leaving the business vulnerable to large ransoms which they may or may not be able to pay. Don’t be this business.

This past year, our incident response team has worked on several ransomware remediation projects, and through this effort learned more about how ransomware is deployed. During this presentation, we are going to walk you through how ransomware has changed over time, help you understand what a hacker looks for nowadays, and actionable protection steps to take.

In this presentation you will learn about:

  • The evolution of ransomware
  • Common characteristics of infection
  • A hacker’s typical timetable
  • Recommended actions for remediation

Brian Miller is the co-founder and CEO of FusionTek. He has over 20 years of IT service experience and co-founded FusionTek in 2007. He is focused on delivering advanced cybersecurity and productivity solutions to FusionTek’s clients.

[1 CPE] The Anatomy of a Ransomware Attack

  Presented by Red Canary

In this presentation, we walk through the Anatomy of a Ransomware Attack. Bobby Mazzotti will lead the discussion on best practices and strategies you can apply at your organization. In this webinar, security leaders will learn:

  • How to enhance your team’s abilities to identify security incidents
  • The key components of a ransomware attack
  • Effective ways to improve your security program

[1 CPE] How to Stay Ahead of the Curve in the Ransomware Crisis

  Presented by Blumira

Unfortunately, ransomware is here to stay. Ransomware attacks are becoming more profitable, and ransomware-as-a-service operations continue to lower the barriers of entry for more cybercriminals to launch attacks.

Major attacks like Colonial Pipeline have put ransomware in the spotlight, but it’s not enough to simply be aware of ransomware. Security and IT professionals need to take action and be ahead of the curve to prevent ransomware.

Matt Warner, CTO and co-founder of Blumira, a threat detection and response provider, will discuss what security teams should arm themselves with to win the battle against ransomware. He’ll cover:

  • An overview of the current ransomware threat landscape
  • Security tools and methods to have in your arsenal to detect signs of ransomware
  • Suspicious activity to look for in each step of the ransomware kill chain
  • How leaning into IT security fundamentals can prevent ransomware outbreaks

Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection, and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve & StorageCraft

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.