Adding Anomaly Detection to Your Secure Access Strategy

  Presented by Cisco

Security analytics are a double-edged sword: while the information they provide can be vital to identify potential issues or anomalies before they become problems, the quantity of data collected, and alerts generated can overwhelm even the most experienced security team. As an admin, you want to efficiently focus on the likely risks and remediate them. How can we best filter the noise of routine authentications and highlight anomalous logins that may require attention? Join Cisco’s Ted Kietzman to explore anomaly detection and secure access.

Automating the Analyst

  Presented by Darktrace

Alongside the rise of today’s dynamic workforce, the speed and scale of sophisticated cyber-attacks is rapidly increasing. As the cybersecurity industry continues to endure an ongoing skills shortage, over-worked and under-resourced teams urgently need augmentation in order to defend against evolving, sophisticated threats.

For over three years, Darktrace experts have been working to meet this challenge, investigating whether they could teach AI to think like a cybersecurity analyst. It takes subtle, nuanced skills and implicit knowledge for an analyst to detect genuinely threatening activity, and the creation of the world-first Cyber AI Analyst took analyzing over one hundred of the world’s top threat analysts and complex machine learning algorithms.

To Pay or Not to Pay: What is Ransomware?

  Presented by INTERFACE Advisory Council

In this session, we will discuss what ransomware is, how it happens and what can we do to prevent or recover from it. We will also briefly discuss the Dark Web; what is it and how is it used? Join Luis Brown – CISO for Central New Mexico Community College for his firsthand expertise. You will also learn more about criminal activity and what you need to be aware of to protect yourself and all your end users.


Speaker:

Luis Brown • Chief Information Security Officer, Central New Mexico Community College

Extended Detection and Response (XDR)

  Presented by Trend Micro

As the global threat landscape continues grow and evolve, security tool sprawl is a common concern among many organizations. These tools are generating an overwhelming amount of data that lacks context and is not immediately actionable. While many modern security solutions have some built in integration functionality or API capabilities for integration into the larger security tools footprint, many require some sort of “glue” in order to build a cohesive cross-platform detection and response strategy. This presentation will highlight the importance of developing an Extended Detection and Response (XDR) strategy that utilizes all of that valuable data and gets your organization to remediation quickly and confidently.

Enduring from Home: COVID-19’s Impact on Business Security

  Presented by Malwarebytes

All of us are living in the new Work from Home normal caused by the rapid transmission and spread of COVID-19. While people everywhere have been worried about stopping the spread of COVID, malicious threats have not only continued to propagate but they have exploded in new and interesting ways. During this presentation we will review some of the more creative ways hackers have targeted business and individuals during the age of Work from Home and some ways to protect yourself from them.

ICS and Cybersecurity’s Critical Path

  Presented by NebraskaCERT

Industrial Controls Systems are increasingly vulnerable to attack. Organizational budgets don’t always allow for the full replacement of operational technology (OT) or building automation management (BAM) equipment that was initially purchased on a longer lifecycle than most typical IT purchases. Security is becoming paramount to ensuring access to critical systems and information and continues to be an exploitable risk in organizations, even during a pandemic, due to ransomware, phishing, and poor asset management techniques. Strategic security that is aligned with your organization needs to be balanced with the budget, risk, and organizational culture.

How do organizations implement critical security controls while still supporting the goals of production, user experience, and efficiency? When buildings are designed and built, and the building administration systems are put into place, how does this impact the risk of healthcare, manufacturing, or financial organization? Are those systems part of the cybersecurity risk analysis?

During this presentation, attendees will review best practices on both sides of the ICS security and IT security continuum. In addition, a simple approach that focuses on the fundamentals of security to reduce risk in these environments is presented. Attendees will walk away from this workshop with actionable knowledge on how to facilitate the conversation as to how OT/BAM security and IT security must work together to align risk with cost in most environments. 

Presenter: Matt Morton • Board Member for NebraskaCERT

Infoblox Threat Intelligence Report: July – September 2020

  Presented by Infoblox

This session will dive into recent Threat Intelligence Research including new malware variants and trends that were prominent over the July-September 2020 timeframe. We will examine specific Ransomware, Infostealers, Trojans, and RATS! attacks that surfaced over the last 90 days. Discover tips to improve your defenses and defeat these types of treats.

The Number One Challenge In The Digital Transformation to the Cloud – You

  Presented by Check Point

Using public clouds for enterprise datacenters is now mainstream; the advantages are significant and the gained agility undisputable. However, the number of services and options being offered is daunting. With these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.

Another reality you will face as you scale is the challenge of using a ‘one-size-fits-all’ interface. Imagine scrolling through lists of assets when the numbers are in the hundreds or even thousands. Think about trying to find a misconfigured or exposed S3 bucket when you have thousands; it’s like finding a needle in a stack of needles.

If you’re like most enterprises, you have a resource gap and don’t have the experienced, trained security professionals maintaining your cloud environment(s). This gap exacerbates risks. The cloud environments available today are extremely comprehensive and powerful, but in unskilled hands, one fat-finger can have dire consequences. As you implement ephemeral cloud-native services like Lambda functions and other cloud-native platform components, new challenges will arise when conducting threat-detection and attribution.

In this session, you’ll see your future and what to expect managing your public cloud-based datacenter. You’ll learn why Gartner says, “Through 2023, at least 99% of cloud security failures will be the customer’s fault.” We will highlight the top challenges you will face and show you what you should prepare for before you scale. We will also detail recommended best practices for securing and maintaining compliance in your public cloud data center.

Cyber AI and Geopolitics: Managing Tomorrow’s Cyber Risk

  Presented by Darktrace

Against a backdrop of escalating geopolitical tensions and an ever-evolving threat landscape, the risk of cyber-attacks to governments and the private sector alike has never been higher. Join Darktrace’s Director of Strategic Threat, Marcus Fowler, and Americas CISO, JR Tietsort to discuss this new era of cyber-threat and how Cyber AI can help defenders regain the upper hand.

This speaking session will include a Q&A with our experts, and explore:

  • How nation-state attacks are changing
  • How organizations can respond to the classic balance of security and productivity
  • How organizational maturity in risk management is maintained whilst ensuring cyber defense