Full Agenda
Timeline (MDT) | Session Details |
---|---|
10:00am | Event Kickoff & Introduction Domenica (Lee) Crognale, Event Chairperson & SANS Certified Instructor |
10:10am | Elite SOC Performance Through Intelligence Led Security Operations - "Peacetime" and "Wartime" Perspectives For digital enterprises cyber threat is a full-on business interruption risk with consequences that are significant and potentially existential. SOCs are underperforming, CISOs are stressed, and C-suite question the ROI. There is a better way. With over a decade protecting BT, former CSO Steve will share his real-world experience in achieving the security mission at an elite level through three areas of “grip” and two “states of operation” and show it for real. See how the smart use of intelligence with AI drives critical decision-making cycles. Steve Benton, VP of Threat Research at Anomali |
10:45am | Cyber Showdown: Unveiling APTs and Ransomware Join us for an eye-opening session where we delve into the dark web to uncover chilling tales of cyberattacks and adversaries. We'll explore real-life examples of exploitations uncovered by our expert threat hunting team, highlighting how bad actors can exploit weak security practices to infiltrate organizations. Through detailed case studies, we’ll demonstrate the devastating impact of these cyber threats and provide insights on how to protect your organization. Don't miss this opportunity to learn from the mistakes of others and fortify your defenses against the lurking dangers of the dark web. Steve Baer, Global VP of Field Sales at NetWitness John (JP) Pirc, VP of Product Line Management at NetWitness |
11:20am | Detection Engineering for Email Threat Protection: Do's & Don'ts for Building High-Fidelity YARA Rules Email-based attacks are the most prominent threat vector that organizations see today. Securing email nowadays means worrying about malicious attachments, links leading to malware, links leading to phishing sites, and business email compromise attacks. Traditional MTAs and default MS and Gmail security controls don’t prevent all threats from reaching the intended target. Additional controls are a must. This is where YARA can play a critical role in an organization’s defense strategy. The ability to construct high-fidelity custom YARA rules is crucial in order to catch advanced threats while also preventing false positives. YARA rules for email must be written to target a specific section: email header, email body or attachments focusing on the specific emails/email providers or geolocation, file types/sizes, specific campaigns and related language and term usage that can be found used in an email’s message body. In this session, we'll discuss how to effectively use YARA to triage and analyze malicious emails. Igor Lasic, SVP Technology at ReversingLabs Jason Valenti, Director, Product Management at ReversingLabs |
11:55am | Event Recap & Closing Remarks Domenica (Lee) Crognale, Event Chairperson & SANS Certified Instructor |