Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

How to Be a Worthy Opponent at a Table of Cyber Criminals

  Moderated by INTERFACE Advisory Council

In today’s world, end users are not the only people interested in your technology. Organizations are constantly under attack and information is often the target. What kinds of attacks happen? How do you stay ahead of the curve when the attacks are constantly evolving? What resources are available to you? Join the Advisory Council in a panel discussion on cybercrimes and what you can do about them.

Moderated by:

  • Amy McLaughlin • Director of Information Services at OSU

Panelists:

  • Lisa Vasa • CISO for the Oregon Secretary of State
  • Matthew Wilson • VP Risk & Administration at Oregon Community Credit Union
  • Richard Rader • CTO at Seven Feathers Casino & Resort

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

The Current Malware Threat Landscape & Enterprise Grade

  Presented by Malwarebytes

Malware has become one of the biggest threat challenges faced by security and IT teams. Malwarebytes Labs conducts extensive proprietary research and analysis. The findings are periodically published to help security teams better understand the nature and evolution of these threats.

This presentation will cover key findings from our newly released annual report. It will highlight malware category trends and discuss new and emerging threats to be on the watch for. There will also be a discussion of industry best practices and technologies that can help your business to prevent, detect, and remediate these threats.

Attendees will leave with insight into the current malware threat landscape, as well as an understanding of steps they can take to mitigate breaches.

Risk, Reliance and The Resilience Imperative

  Presented by Jeff Gaynor • President, American Resilience, LLC

America’s global cyber adversaries appreciate our Nation’s increasing reliance on an Internet that exceeds our ability to “secure.” These predators also appreciate reliance multiplies target values and both immediate and cascading consequences. With Americans’ willing acceptance of the risks inherent in “The Internet of Things” and it’s convenient, entertaining, highly invasive and exploitable devices; our global adversaries are also coming to realize America has created its own Achilles Heel.

In her March 18 State of Homeland Security Address, former Homeland Security Secretary Kirstjen Nielsen (among many courageous and direct statements) observed: “We face a choice: Shape the world around us or get shaped by it.” She added: “We are going from “highly reactive” to “highly resilient” and to that end called for “Relentless Resilience” and a “Whole of Society Approach” to correct America’s increasingly exploited cyber-reliant critical infrastructure and national preparedness trajectories.

In examining the above realities, Jeff will cite history, lexicon issues, and pose questions the answers to which drive “The Resilience Imperative.” He will then present the operationally proven, objectively measurable, nationally comprehensive and compatible resilience-based mindsets, metrics, methodologies and technologies required to achieve the Secretary’s objectives and in the process of doing so, ensure America’s cyber-reliant safety, security, quality of life and future for this and generations of Americans’ to follow.

Architecting the New SD-WAN Edge for the Cloud-first Enterprise

  Presented by Silver Peak Systems

Adoption of cloud services has driven enterprises to re-think WAN architecture. Architectures based on traditional, manually-programmed routers can’t keep pace. A business-driven SD-WAN can provide secure direct connections from the branch to SaaS/IaaS across the internet, significantly increasing application performance resulting in a superior end-user QoEx (Quality of Experience). By integrating SD-WAN, WAN optimization, routing and security in a single unified platform, enterprises can simplify branch WAN edge architecture, accelerating time to value and dramatically reducing operational costs. From a centralized SD-WAN orchestrator, application priorities and QoS and security policies may be configured and assigned to automate traffic handling across the WAN. A single mouse click distributes SD-WAN configuration parameters to all sites, improving operational efficiency and minimizing the potential for human errors that can negatively impact application availability and enterprise security. This session will describe why SD-WAN adoption continues at a breakneck pace because of the user productivity, agility and cost savings benefits that a business-driven SD-WAN delivers.

Breaking Security Silos: How Better Integration Mitigates Cybercrime Expos

  Presented by Fortinet

Many solutions exist to solve particular security and technical issues in your network. But as solutions are added, complexity is increased as ‘Silos’ are created and visibility suffers. By breaking down these ‘Security Silos,’ you can get a better overall picture of what’s transpiring on your network as well as reducing your overall attack surface. Key topics of Malware propagation, common threat vectors, encryption complications, and pragmatic approaches to defense will be presented to the attendee.