Agenda | November 8, 2024 | 9:15AM - 2:00PM ET
Timeline (EDT) | Session Details |
---|---|
9:15 AM | Welcome & Opening RemarksTerrence Williams, Certified Instructor, SANS Institute |
9:30 AM | Session One: Cybersecurity essentials for threat detection and remediationWith emerging new-age threats on one side and - Log management basics: Consolidate and centralize log data - Attack strategies of the present day: - Vulnerabilities Ranjith, Senior Technology Evangelist, ManageEngine |
10:00 AM | Break |
10:15 AM | Session Two | Using Enriched NDR Data for Threat Hunting in the CloudThis session will discuss how Corelight uses cloud-enriched Zeek logs for public-cloud visibility and threat hunting. We will discuss how Corelight's foundation of Zeek enables dynamic tagging of traffic logs with public cloud details to enable faster incident response and threat hunting with additional contextual information. Mark Overholser, Technical Marketing Engineer, Corelight |
10:45 AM | Session Three | Tracking APT41 with Mobile EDRAPT41 is a state-sponsored APT espionage group based in the People’s Republic of China that has been active since 2012. Unlike many nation-state-backed APT groups, APT41 has a track record of compromising both government organizations for espionage, as well as different private enterprises for financial gain. According to U.S. grand jury indictments from 2019 and 2020, the group was involved in compromising over 100 public and private organizations, and individuals in the United States and around the world, including Australia, Japan, India, South Korea, Singapore, and Taiwan. These companies include software development companies, computer hardware manufacturers, telecommunications providers, social media companies, video game companies, universities, think tanks, and foreign governments, as well as pro-democracy politicians and activists in Hong Kong. During this session, we will provide insight how Lookout collects, analyzes, and enriches their data set, and how Lookout was able to identify DragonEgg and WyrmSpy using Lookout's mobile endpoint detection and response capability. Jim Coyle, Public Sector CTO, Lookout |
11:15 AM | Session Four | Strengthening Detection & Response with CensysJoin us at the Fall Cyber Solutions Fest 2024 Detection & Response Track to explore how Censys technologies empower security teams to enhance visibility, reduce response times, and fortify their security operations. We will explore how continuous monitoring, automated risk prioritization, and seamless integration with security tools help analysts detect emerging threats faster, close detection gaps, and enhance overall SOC performance. Learn to leverage these capabilities for automating vulnerability assessments and operationalizing your detection workflows. Shunta Sharod Sanders, Senior Federal Pre-Sales Engineer, Censys |
11:45 AM | Break |
12:00 PM | Session Five | Keynote: Technology for the Good of the CommunityJoin us for this enlightening keynote session where you will learn the following: - How AI is evolving from large language models to large quantitative models, and associated security implications- The intersectionality of quantum computers and cybersecurity- Recommendations for how organizations should protect their crown jewels data from threats of today, and tomorrow And so much more!! Don't miss it. Rob E. Williams, Head of Global Channels, SandboxAQ |
12:50 PM | Afternoon Kick-offTerrence Williams, Certified Instructor, SANS Institute |
1:00 PM | Session Six | Cryptojacking in the CloudMegan Roddie, Co-Author, SANS Institute & Sr. Security Engineer, Datadog |
1:20 PM | Session Seven | Ghosts in the Network - Uncovering APTs Like Hidden Cobra Without Clear Indicators of CompromiseIn this session, we will explore the technical intricacies of detecting targeted malware in APTs when you are under a sophisticated attack. As a real-world example, we will follow Hidden Cobra’s operations, especially its evasive malware. You’ll learn how to enhance your network security even without clear Indicators of Compromise (IOCs) to stay ahead of increasingly sophisticated attack campaigns. Join us to learn about how to hunt malware in your organization and get critical takeaways around:
Ali N. Khan, Field CISO, ReversingLabs Stuart Phillips,Threat Intelligence Researcher, Reversing Labs |
1:50 PM | Wrap-UpTerrence Williams, Certified Instructor, SANS Institute |