Just Another Day on The Internet: Today’s Threat Landscape

  Presented by Palo Alto Networks

Sometimes, the best offense is a really great defense. This can be especially true in the world of cyber threat hunting and prevention. With all that lurks on the dark side of the internet, it is comforting to know you can improve your defensive posture with actionable intelligence. Join this session to receive a detailed picture of today’s actual threat landscape — brought to you by a seasoned professional with one of the world’s preeminent global threat intelligence teams, Palo Alto Networks’ Unit 42.

I’m From the Feds: We’re Here to Help!

  Presented by Theresa Masse • Cybersecurity Advisor, US Department of Homeland Security

You know at some point you will experience a cyber incident, if you haven’t already! The extent of the impact may not always be immediately obvious, however being adequately prepared makes the difference between chaos and responding effectively. This presentation provides an overview of federal cyber security services to assist private and public sector entities in improving their cyber monitoring, controls, incident response, awareness, and overall security posture. There are a number of assessments that will help organizations better understand their risks and inform decisions on prioritizing resources and funding. Whether large or small, all organizations are potential targets, and all employees have an important role in information security. Bad actors, whether criminals or nation states, are using more sophisticated techniques and tactics to infiltrate systems. Organizations must be prepared to react quickly and effectively, no entity is an island or immune from a cyber-attack. The federal government is committed to helping through sharing intel in a timely manner and offering relevant programs that can make a significant difference. Cyber resources and assistance can be expensive, however, there are a variety of federal cyber services available and all are free of charge. Take advantage of them!

Ms. Masse is a Cyber Security Advisor in Region X (Alaska, Idaho, Oregon, Washington) for the US Dept. of Homeland Security. Prior to that, she served as the Chief Information Security Officer (CISO) for the Port of Portland for 5+ years. Theresa was the first CISO for the State of Oregon and served in that capacity for 10 years. Previous to that, she worked in the private sector as the Senior Director for Information & Corporate Security at Cummins Inc., an international Fortune 500 company.

Ms. Masse has a Top-Secret security clearance. She is a former member of the executive committee for the State, Local, Tribal and Territorial Government Coordinating Council and was chair of the Cyber Security subcommittee. Theresa also served on the Cyber Security Advisory Board at Mount Hood Community College. She is a past member of the executive committee of the Multi-State-Information Sharing and Analysis Center (MS-ISAC) and currently serves as a co-chair of the mentoring program. Theresa has a Masters degree with a major in Management.

The CCPA is Here: What’s Changed and What You Need to Know

  Presented by OneTrust

While the California Consumer Privacy Act (CCPA) is now law, many key amendments and details about the law only passed just before the law’s effective date – meaning privacy and security pros are still working to build CCPA-compliant programs. In this session, we’ll share all the latest news on the CCPA law, including which amendments passed and how that impacts your privacy program. We’ll share a 5-step plan for CCPA compliance and what to expect in the future for the CCPA.

The Human Element in Threat Detection: Endpoint Threats in 2020 and Beyond

  Presented by Malwarebytes

From ransomware to Mac threats, attacks are up this year. Join Malwarebytes Lab and your peers for an enlightening hour of discussion and interaction.

Pulling from our analysis of millions of attacks on endpoints each year, we’ll recap 2019 threats and outline emerging trends in 2020. Together we’ll cover:

  • Huge shifts from consumer attacks to organizations
  • Growth in mobile threats
  • Top attacks for PC, Mac, and Android
  • Global threats and detections
  • Top industries impacted
  • Rise in ransomware
  • 2020 cybersecurity prediction
  • Blending automation with human elements to keep endpoints operational

An Appeal for Cybersecurity Consolidation

  Presented by Fortinet

Come participate in a discussion about the Cybersecurity counterculture of platform consolidation. Learn of the potential benefits like reduction of complexity, and greater visibility and control.

Ticket Harvesting: What Is It and Why Do I Care?

  Presented by Varonis

Dive into what exactly ticket harvesting is and how hackers use AD to facilitate an attack. In this presentation, we will look at what they are looking for and why it’s critical to make sure the security is in place to prevent this type of intrusion. With this knowledge. We will also walk through a real-life scenario where a local engineer exploits AD to elevate his access and steal confidential data. We will then take a deeper look into the behaviors that could have warned you that this attack was occurring.

Data Protection and Management

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and data storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

How to Assess Your Organization’s Threat Hunting Readiness

  Presented by Corelight

Many organizations want to threat hunt, but don’t know where to begin, how to measure success, or how to scale an effective program. The bar to successful hunting can appear intimidatingly high, reachable by only the most sophisticated, well-staffed SOCs. But the reality is that existing staff–with the right data and some directional guidance–can begin hunting today and start making immediate security contributions to your organization.

Join Corelight for this session to learn about the threat hunting maturity model, obtain guidance on best practices, and see examples of threat hunting scenarios. We’ll also discuss how to assemble the systems, data, people and processes your organization needs to start hunting.

Data Protection and Management

  Presented by StorageCraft

Managing storage continues to be complex, and often expensive. Something needs to change, and it certainly won’t be a dramatic increase in staffing. Fortunately, object storage is the answer. By eliminating the use of legacy RAID, object storage, can be the foundation for a scale-out converged storage solution that solves both data protection and data storage challenges. Want to recover a multi-TB VM in less than a second? No problem. Want to protect files from ransomware? No problem. Need an enterprise file serving, archiving, or virtual server storage solution? No Problem. Attend this session to learn how object storage is changing the landscape for IT admin and the technology of the future.

Hacking Exposed: A Look Inside the Techniques of OceanLotus/APT32

Presented by BlackBerry/Cylance & Structured

Take a journey with us, as we expose the mind of the enemy, revealing some of the latest methods that cybercriminals use to infiltrate modern security defenses, and how you can thwart them. You will learn about the ever-changing threat landscape and how you can prevent and respond to today’s most pervasive threats – including ones never seen before. With the best tools, expertise, and powerful AI-based technology, we will uncover the secrets behind today’s modern hacking arsenal and provide you with the means to protect your organization.