Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Active Directory Security: Early Stage Attack Activities to Watch For

  Presented by STEALTHbits Technologies

Attackers have demonstrated a consistent and ongoing ability to obtain access to workstations inside the network boundary through phishing and other web and email attacks. From here, attackers set their sights on gaining control of Active Directory as a means to an end; compromising Active Directory is an easy way to gain access to all critical corporate data and resources. Darin will discuss two early stage attack activities: LDAP reconnaissance and Password Spraying—that allow attackers to move laterally inside your AD environment. Detection strategies and mitigation steps will also be explained.

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Best Practices for Securing and Monitoring Microservices and Linux

  Presented by Sysdig

Containers and microservices are designed to provide a reliable and low-cost way for teams to build and ship distributed applications. However, they also add extra layers of abstraction and orchestration to your environment that hinder your ability to do performance monitoring and security enforcement. Many challenges companies face in this world are similar to that of the traditional Linux world; however, the microservices layer adds additional complexity.

We’ll discuss how to overcome this challenge and specifically discuss:

  • Benefits and drawbacks of different approaches to data collection in containers
  • How using metadata from orchestrators like Kubernetes helps optimize and secure your containers
  • Best practices for alerting and compliance in a distributed ephemeral infrastructure
  • How troubleshooting and forensics has changed in containerized environments

Adapting to Fight Back: How Cyber AI Neutralizes Never-Before-Seen Threats

  Presented by Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks daily. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

Extreme IT Security: Where IoT and Security Collide

  Presented by Xiologix

The use of IoT devices is proliferating in every industry, and with this growth comes risk—reports of IoT attacks increased 600 percent from 2016 to 2017. You must take a zero-trust approach to network security. You must develop a strategy that only allows “good behavior” rather than just defending against bad behavior and yesterday’s threats. It is critical that your network security and zero-trust strategies encompass your IoT devices as well. Learn about the technology and practices that will help you sleep at night.

No Network Needed?!?!

  Presented by Zscaler

It seems every day, we are bombarded with news of yet another breach and our personal information being traded and sold on the dark web/Internet. We lose sleep wondering if we have the right controls and policies in place to prevent our companies and our names from appearing in the next morning’s headlines. Is it time for a different approach? What if we could get rid of our network so we no longer had to define complex boundaries and policies? Is it really possible to architect a system that removes all the traditional ingress and egress points? If we resign ourselves to the fact that it’s not IF but WHEN our network gets breached…then why do we still have a network?

Transform Networking & Security

  Presented by GCSIT Solutions

In order to keep up with the increasingly dynamic, distributed nature of modern applications, security needs to be an intrinsic component of the infrastructure that applications and data live on, rather than a bolted-on afterthought.

We eplore how:

  • You can enable micro-segmentation on the network with VMware NSX to prevent the lateral spread of threats.
  • And how VMware vSphere and vSAN deliver at-rest data encryption.

Elevate Your Fruit: A Layered Security Approach

  Presented by Mark Merchant • CISO, Municipality of Anchorage

As we are all well-aware, the CIS top 20 Critical Security Controls are a highly effective set of best practices developed by leading security experts from around the globe. If you are serious about protecting the confidentiality and integrity of your systems and information, effective implementation of these controls can certainly aid in “elevating your fruit to higher branches” and help keep it safe against the rapidly growing threat that exists today. In this presentation, I will touch on key concepts from the CIS Controls and identify some real technical examples of things that you can do in your organization without having to spend hundreds of thousands of dollars to achieve.