Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks are rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms. Join Darktrace as we discuss the Cyber AI Analyst in action.

Situational Awareness Into the Dark Web

  Presented by Check Point Software

In our journey through this session, we take you through the evolution, goals, and motivation of the Dark Web. We will share with you what and whom you can find on the platforms as well as the major conflicts individuals face while exploring this web. The session also exposes you to the syndicates and structures running on the platforms. Surprisingly, we see how those groups were among the first to embrace and implement Blockchain technology and created a major global demand for crypto currencies. This is the time to listen, learn, and be exposed to the deepest secrets of the Dark Web.

Critical Planning: Timeline and Lifecycle of Responding to a Ransomware Attack

  Presented by Shawn E. Tuma • Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP

This session will discuss the lifecycle of a ransomware attack and address key phases such as: how they happen, what the process is for recovery and investigation, and what can be done ahead of time to prepare for and hopefully prevent them from happening.

Bio:
Shawn is an attorney internationally recognized in cybersecurity, computer fraud and data privacy law, areas in which he has practiced for over two decades. Shawn helps businesses protect their information and protect themselves from their information.

He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice Group where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises, across the United States and globally in dealing with cybersecurity, data privacy, data breach and incident response, regulatory compliance, computer fraud related legal issues, and cyber-related litigation. While this area of the law has evolved greatly in the 20+ years while Shawn has been practicing, he continues to evolve with it as a practitioner representing his clients, academically as an author and instructor, and as an analyst for the national media.

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Threat Hunting 101

  Presented by CrowdStrike

Threats can come at you anytime and from any number of sources. In this session, Bradley Grandorff, Crowdstrike Systems Engineer, takes us through free form search and how he solved a real world incident that forced a customer to shut down their IT systems. Bradley will go in-depth on threat hunting techniques and help teach you what you need to be aware of. Learn tips from an expert with several decades of experience in information security working for companies such as Cisco, Splunk, and now Crowdstrike.

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks are rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms. Join Darktrace as we discuss the Cyber AI Analyst in action.

Talent by Design: The Cybersecurity Workforce Lifecycle and Challenge

  Presented by Cloud Security Alliance North Texas Chapter

Cloud security and the evolving cybersecurity technologies require different skill sets than 15 years ago. Many companies and leaders talk about the talent shortage, skills gap, and necessity for the right kind of training for the right kind of talent.

People who are earning cross-certifications that combine skills – such as the Certified Cloud Security Professional (CCSP) co-created by (ISC)² and Cloud Security Alliance – are seeing a big boost in pay. If you have those skills, you’re in a good position to command those higher salaries.

But what steps can we as the industry take to bring our community closer together to build the foundation early and have a starting point for new entrants – whether just out of college, coming out of a specialized program, out of the military, etc.

During this session, dynamic experts will share ideas on how we can leverage all the education, mentorship programs, and training and leadership skills-based workshops available to better contribute to the workforce in an evolving cybersecurity landscape.

You Are No Longer Forgotten: The Small Business Security Challenge

  Presented by Chris Roberts • HillBilly Hit Squad

Most of the security industry is chasing “around” 31,000 larger enterprise sized companies for their business. The list is well known, circulated and targets are on the backs of ALL the C-Suite, most of the technical folks and the MSP/VARS that support them. The Security industry circles them like packs of hyena or vultures waiting for one of them to fall, get breached, or for a vendor to be thrown out… pouncing on the fresh kill with glee…

Meanwhile, you’re sitting there getting slaughtered by every adversary known to mankind because you ARE the forgotten, you’re too small for the multi-billion $$ cyber companies whom IF they decide to deal with you will flood you with MSA’s, SOW’s and NDA’s that would take a week’s worth of lawyer time JUST to understand, let alone realize that they’re not accountable for anything, unlikely to want to support you and in all honestly you’ll get a 1-800-YOU-AREN’T-SPECIAL number as your sole source of support.

We’re going to address the current situation, the state of play, and give you some thoughts, suggestions, ideas AND plans. We’ll provide resources on HOW to evaluate, where to look, what to do AND importantly we’ll do it because it’s what we’re doing. We live, breath and deal with this daily. We’ve sat in the meetings when the large cybersecurity companies state, “we’re done dealing with the SMB market” and we’ve got the battle scars from dealing with those subsequent consequences.

First Line of Defense in Assessing your Organizations Cybersecurity Risks

  Presented by Fortinet

Assessing the resilience of your network can dramatically improve your ability to fend off prospective breaches. New applications and services introduce new avenues of attack. Without knowing the potential weaknesses within your network, you cannot successfully defend it.

Join us to hear about:

  • how assessments give you the visibility you need to make more informed, data-driven decisions
  • how you can prioritize strategic initiatives and obtain budgeting more easily by running assessments
  • how certain verticals (education, healthcare, et al.) can benefit from understanding their specific threat landscapes and common industry-wide threats.

During this session we will also cover:

  • a firsthand demonstration on how data is collected and processed, and logs are analyzed from your network during an assessment
  • contents of a sample findings report and how recommendations can help prioritize your security strategy

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.