Deep Learning: A Radical New Way to Detect Malware

Presented by Blue Hexagon

The transformative power of deep learning is being applied to every aspect of our lives– from speech recognition and cancer imaging to autonomous driving cars. Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware variants created at unprecedented volume and velocity. In fact, deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time.

In this session, hear about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. Finally, explore a case study of how a multi-vector, polymorphic variant of the Emotet malware was detected with “deep learning inspection”. Deep dive into how the deep learning models were executed on different phases of the Emotet attack kill chain.

The Current Malware Threat Landscape & Enterprise Grade Remediation

Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Deep Learning: A Radical New Way to Detect Malware

Presented by Blue Hexagon

The transformative power of deep learning is being applied to every aspect of our lives– from speech recognition and cancer imaging to autonomous driving cars. Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware variants created at unprecedented volume and velocity. In fact, deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time.

In this session, hear about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. Finally, explore a case study of how a multi-vector, polymorphic variant of the Emotet malware was detected with “deep learning inspection”. Deep dive into how the deep learning models were executed on different phases of the Emotet attack kill chain.

Cyber AI: Fighting Back with Autonomous Response

Presented by Darktrace

The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments against machine-speed attacks has never been more difficult.Yet the digital battleground now features its most formidable defender in Cyber AI — a self-learning technology that distinguishes friend from foe in order to thwart threats autonomously. With the Cyber AI Platform protecting your entire infrastructure in real time, it doesn’t matter whether the attack originates on a connected device, an industrial system, or in the cloud. Wherever it strikes, the AI fights back in seconds.

In this session, you’ll discover:

  • Why only Autonomous Response can counter today’s machine-speed attacks
  • Where advanced threat-actors exploit vulnerabilities in the cloud and IoT
  • What achieving 100% visibility can reveal about your organization’s risk profile
  • How the Cyber AI Analyst reduces the time spent triaging threats by 92%

PCI and Your Organizational Liability

Presented by Structured

Payment card processing is a critical service many companies and organizations offer. But with this service comes the added responsibility to comply with PCI requirements, and the technical, administrative, and physical controls applicable to card processing environments. Failure to comply can result in costly fines. Plus, a breach of card holder information could have disastrous financial and public relations consequences for compromised merchants.

Want to know more? With compelling and engaging content delivered by Rob Wayt, a PCI Qualified Security Assessor (QSA), you will learn the intricacies of these requirements, proper scoping, and how to mitigate risks that merchants have while card processing.

Fighting Cybercrime with Artificial Intelligence

Presented by Fortinet

In this session you will learn how we are using modern A.I. and machine learning to assist in threat research. Additionally we’ll discuss the evolution of threat research/methodology and how global collaboration leads to enhanced protection for everyone.

The Current State of Ransomware and Proactive Ways to Combat It

Presented by Xiologix

In this presentation, we will do a quick review of the current state of ransomware and then jump right into proactive approaches utilizing the latest tools to prevent and combat this growing threat. We will include a discussion of identifying attack vectors, network defenses, storage defenses, asset management, SOC, incident response, and the benefits of each.

Achieving a Successful Security Segmentation

Presented by Illumio

You rely on the network to deliver applications. But as IT scales in size, connectivity, and environments outside the network to public cloud, we cannot rely solely on the network to secure applications. The answer is to decouple security segmentation from the network. This allows us to protect applications wherever they run –because they do not live exclusively on our networks anymore, and enforcement must go wherever they do.

During this informative session, we’ll discuss:

  • What is security segmentation?
  • Challenges of traditional network segmentation
  • Decoupling segmentation from network architecture
  • Principles of successful security segmentation
  • 5 steps to implement a strategy

Zero Trust with Micro-Segmentation: Doing It the Right Way

  Presented by Guardicore

In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data.

Originally conceived in 2010, the zero-trust security concept has recently gained new ground and is now seen as a vital element of enterprise information security. It is a model that aids user and device verification, strengthens authentication processes and ensures encryption.

However, zero trust is not without its challenges, and mastering the art of zero trust takes strategic management and forethought.

In this session, we will explore the concept of zero trust, assess why it is needed in the modern enterprise and outline how micro-segmentation can help win the zero trust race for organizations.

Key takeaways:

  • Why there is a need for zero trust
  • The challenges of implementing zero trust
  • The four high-level principles of zero trust
  • How micro-segmentation can help you prepare for, implement and manage zero trust in your organization

Architecting the New SD-WAN Edge for the Cloud-First Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.