Putting AI to Work to Help Fight Cyberattacks

  Presented by Palo Alto

Hackers are increasingly automating their attacks, enabling them to exploit vulnerabilities more quickly. Cybersecurity software vendors are responding by turning to machine learning technology, a subset of artificial intelligence (AI), to try to stay one step ahead of the bad guys. This presentation will talk about how machine learning is used to help identify variations of known threats and patterns in attacks in order to predict the next stages of an attack, then automatically create and implement protections for customers in near real-time.

Master the Edge: How to Achieve Context-Aware, Zero Trust Network Access

  Presented by Aruba & Structured

Have you been tasked with implementing Zero Trust Network Access but are unsure of how to go about it? Are you confused about how to achieve “minimum access”? Are you struggling with employing “continuous adaptive risk & trust assessment” on your network? If so, attend this session. Learn how to deploy an open, multi-vendor Enterprise security framework that gives security and IT teams an integrated way to gain visibility, control, and advanced threat defense. See how security prioritization and machine learning helps organizations leverage existing third-party solutions to better protect investments and implement proactive risk controls.

Hacking Exposed: A Look Inside the Techniques of OceanLotus/APT32

  Presented by Cylance & Structured

Cyberattacks are among one of the most prevalent threats to organizations and individuals today. Understanding how cybercriminals operate is essential in defending leading organizations and governments against them. In a session facilitated by BlackBerry’s Chief Evangelist, Brian Robison, attendees will learn first-hand, the tools and techniques of real-world threat actors. This goal of this session is to understand some of the thought processes and techniques used by adversaries and to help CIOs guide their organization’s resources to defend against cybersecurity threats.

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

Adding Anomaly Detection to Your Secure Access Strategy

  Presented by Cisco

Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected, and alerts generated can overwhelm even the most experienced security team. As an admin, you want to efficiently focus on the likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco’s Ted Kietzman to explore anomaly detection and secure access.

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

To Pay or Not to Pay: What is Ransomware?

  Presented by INTERFACE Advisory Council

In this session, we will discuss what ransomware is, how it happens and what can we do to prevent or recover from it. We will also briefly discuss the Dark Web; what is it and how is it used? Join Luis Brown – CISO for Central New Mexico Community College for his firsthand expertise. You will also learn more about criminal activity and what you need to be aware of to protect yourself and all your end users.


Speaker:

Luis Brown • Chief Information Security Officer, Central New Mexico Community College

Extended Detection and Response (XDR)

  Presented by Trend Micro

As the global threat landscape continues grow and evolve, security tool sprawl is a common concern among many organizations. These tools are generating an overwhelming amount of data that lacks context and is not immediately actionable. While many modern security solutions have some built in integration functionality or API capabilities for integration into the larger security tools footprint, many require some sort of “glue” in order to build a cohesive cross-platform detection and response strategy. This presentation will highlight the importance of developing an Extended Detection and Response (XDR) strategy that utilizes all of that valuable data and gets your organization to remediation quickly and confidently.