Hacking Exposed: A Look Inside the Techniques of OceanLotus/APT32

  Presented by Cylance & Structured

Cyberattacks are among one of the most prevalent threats to organizations and individuals today. Understanding how cybercriminals operate is essential in defending leading organizations and governments against them. In a session facilitated by BlackBerry’s Chief Evangelist, Brian Robison, attendees will learn first-hand, the tools and techniques of real-world threat actors. This goal of this session is to understand some of the thought processes and techniques used by adversaries and to help CIOs guide their organization’s resources to defend against cybersecurity threats.

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

Adding Anomaly Detection to Your Secure Access Strategy

  Presented by Cisco

Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected, and alerts generated can overwhelm even the most experienced security team. As an admin, you want to efficiently focus on the likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco’s Ted Kietzman to explore anomaly detection and secure access.

Zero Trust and the Flaming Sword of Justice

  Presented by Cisco

Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at the front of the mind, defenders need to focus on proper network zone segmentation or, as it is a more popular term these days, zero-trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter, a stronger focus has to be placed on the strength of authentication, authorization, and trust models for the users.

The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached the denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust, but verify.”

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

To Pay or Not to Pay: What is Ransomware?

  Presented by INTERFACE Advisory Council

In this session, we will discuss what ransomware is, how it happens and what can we do to prevent or recover from it. We will also briefly discuss the Dark Web; what is it and how is it used? Join Luis Brown – CISO for Central New Mexico Community College for his firsthand expertise. You will also learn more about criminal activity and what you need to be aware of to protect yourself and all your end users.


Speaker:

Luis Brown • Chief Information Security Officer, Central New Mexico Community College

Extended Detection and Response (XDR)

  Presented by Trend Micro

As the global threat landscape continues grow and evolve, security tool sprawl is a common concern among many organizations. These tools are generating an overwhelming amount of data that lacks context and is not immediately actionable. While many modern security solutions have some built in integration functionality or API capabilities for integration into the larger security tools footprint, many require some sort of “glue” in order to build a cohesive cross-platform detection and response strategy. This presentation will highlight the importance of developing an Extended Detection and Response (XDR) strategy that utilizes all of that valuable data and gets your organization to remediation quickly and confidently.

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.