Gaining a Cybersecurity Edge with Threat Intelligence - Agenda | SC Media

Gaining a Cybersecurity Edge with Threat Intelligence – Agenda

DAY 1

10:30 AM ET
Conference opens

11:00 AM – 11:45 AM ET
Keynote: Adload: Not your garden variety adware
Speaker(s): James Antonakos

There are thousands of malware samples discovered throughout the year. While some may be one-hit-wonders, others, upon further review, can reveal a widespread digital pandemic targeting organizations and users across the globe. In the world of malware analysis, digging deeper on a piece of malicious software can unlock Pandora’s box. That’s what occurred with Adload, a malicious payload that’s part of the Shlayer family of malware. In this special presentation, James Antonakos, senior malware analyst at Lansing Dynamics, shares his story regarding the threat intelligence he collected on the malware, how many strains are currently available in the wild, and what organizations can do to protect themselves.

11:45 AM – 12:00 PM ET
Visit exhibit hall

12:00 PM – 12:30 PM ET
Presentation by: Trustwave

12:30 PM – 12:40 PM ET
Visit exhibit hall

12:40 PM – 1:10 PM ET
Webcast: Keeping your gate locked on your IoT devices: Vulnerabilities found on Amazon Alexa
Speaker(s): Oded Vanunu, Head of Products Vulnerability Research, Check Point Software Technologies

Please lower the temperature of the AC, it’s getting humid in here,” said Eric to Alexa, who turned the AC to a cooler temperature in the living room.
it was reported that over 200 million https://www.cnet.com/news/amazons-alexa-event-shows-the-future-of-the-echos-voice-assistant/ Alexa-powered devices had been sold by the end of the year.
An intelligent virtual assistant (IVA) or intelligent personal assistant (IPA) is a software agent that can perform tasks or services for an individual based on commands or questions. Amazon Alexa, commonly known as “Alexa” is an AI based virtual assistant developed by Amazon, capable of voice interaction, music playback, setting alarms and other tasks, including controlling smart devices as part of a home automation system. Users are able to extend Alexa s capabilities by installing “skills” – additional functionality developed by third-party vendors which can be thought of as apps – such as weather programs and audio features.
As virtual assistants today serve as entry points to people’s homes appliances and device controllers, securing these points has become critical, with maintaining the user’s privacy being top priority. This was our “entry point” and central motivation while conducting this research.
Our findings show that certain Amazon/Alexa subdomains were vulnerable to Cross-Origin Resource Sharing (CORS) misconfiguration and Cross Site Scripting. Using the XSS we were able to get the CSRF token and perform actions on the victim’s behalf.
These vulnerabilities would have allowed an attacker to:

  • Silently install skills (apps) on a user’s Alexa account
  • Get a list of all installed skills on the user’s Alexa account
  • Silently remove an installed skill
  • Get the victim’s voice history with their Alexa
  • Get the victim’s personal information

In effect, these exploits could have allowed an attacker to remove/install skills on the targeted victim’s Alexa account, access their voice history and acquire personal information through skill interaction when the user invokes the installed skill.
Successful exploitation would have required just one click on an Amazon link that has been specially crafted by the attacker.

1:10 PM – 1:20 PM ET
Visit exhibit hall

1:20 PM – 1:50 PM ET
Webcast: Detect Emerging Industry Threats to Proactively Protect Your Brand

Speaker(s) :Lindsey Kaye, Director, Operational Outcomes, Insikt Group, Recorded Future Kathleen Kuczma, Sales Engineer, Recorded Future
Too often, organizations are blindsided by cyber attacks targeting their brand. Fraudulent websites, leaked data, and command-and-control attacks are all examples of how threat actors can attack your brand. The repercussions can be devastating — ranging from customer distrust to massive financial losses. Security professionals have limited visibility outside of their own organizations’ network, and of the nefarious corners of the web where cybercriminals are known to launch these attacks.
Proactive brand protection requires up-to-the-minute security intelligence and operational mitigations that can be applied to help protect your organization from these threats. In this session we will walk you through how to use Recorded Future’s Brand Intelligence and Threat Intelligence modules to detect emerging threats to your industry and your peers. We will also demonstrate examples of the migitations Recorded Future provides to help you proactively defend against emerging risks threatening your brand and infrastructure.

1:50 PM – 2:00 PM ET
Visit exhibit hall

2:00 PM – 2:30 PM ET
Webcast: Actionable Threat Intelligence
Speaker(s): Greg Iddon, Threat Response Strategist, Sophos

Signal prioritization, lifting important signals out from the noise, is essential for mature security operations centers. But access to high quality intelligence that helps you derive verdicts and enables you to take action is rare. OSINT feeds are often stale or out of date, URLs for once valid C2s now produce false positives. And even with quality intelligence feeds, how can we turn that intelligence into action?
In this session you will learn:

  • Practical threat intelligence use cases you can implement on your own
  • How our threat hunters utilize Sophos threat intelligence services to improve investigations
  • Suggestions on how to add threat intelligence into your security operations process
  • Threat intelligence features to look for when choosing an intelligence service partner

2:30 PM – 2:40 PM ET
Visit exhibit hall

2:40 PM – 3:10 PM ET
Presentation by: Analyst1

3:10 PM – 3:20 PM ET
Visit exhibit hall

3:20 PM – 3:50 PM ET
Presentation by: Gigamon

3:50 PM – 4:00 PM ET
Visit exhibit hall

4:00 PM – 4:10 PM ET
Visit exhibit hall

4:10 PM – 4:40 PM ET
Webcast: What Attackers Really Think About Your Threat Intelligence
Speaker(s):
Presentation by: Palo Alto

Cybersecurity teams across all industries struggle to contend with more frequent, costly, and sophisticated attacks. That’s why threat intelligence, an evidence-based knowledge extracted from data after it has been gathered, processed, and analyzed, is invaluable to organizations in their proactive detection and defense of cyber threats. In this webinar Mark Whitehead will skillfully examine available technology, cover a year in attacks, and pivot to how threat intelligence works for organizations today and in the future.

DAY 2

10:30 AM ET
Conference opens

11:00 AM – 11:45 AM ET
Keynote: Legalities of using stolen data to hunt cyber criminals
Speaker(s): Vinny Troia, Founder, Night Lion Security

In cybersecurity, knowledge is power. Once organizations began to realize the value of information sharing at scale, many flocked to share and gather as much threat intelligence as possible in the hopes of making informed decisions that would help bolster their defenses. While much of this threat intel is derived from internal sources, others include external channels featuring elicit data that allows threat hunters the ability to track connections from different threat actors. The Department of Justice recently released guidance on online intelligence gathering for cybersecurity, but this continues to be a murky topic for security professionals. How legal is it to leverage this data? What protection requirements are in play? How useful is it? In this virtual fireside chat featuring Vinny Troia, founder of Night Lion Security, he answers these questions and discusses the moral grey areas of the topic.

11:45 AM – 12:00 PM ET
Visit exhibit hall

12:00 PM – 12:30 PM ET
Webcast: KNOW first, ACT fast – shrink your attack surface with integrated threat intel
Speaker(s): Brandon Hoffman, CISO at Netenrich

Actionable threat intelligence means the difference between suffering a breach and thwarting even the most creative digital assault. Once perceived as a distant cybersecurity frontier, the true value of threat intelligence becomes apparent as organizations share information at scale, and new technologies make more data more accessible. Netenrich’s Intelligent SOC approach combines real-time Knowledge NOW (KNOW) global threat intelligence with IBM’s X-Force to create powerful, proactive, and automated security processes. Join us to see how the right blend and use of threat intelligence right-sizes your investment in SOC, uplevels SecOps and lets you stay a step ahead of creative adversaries.

12:30 PM – 12:40 PM ET
Visit exhibit hall

12:40 PM – 1:10 PM ET
Understand Today’s Changing Network and Application Threat Landscape
Speaker (s): Pascal Geenens, Director of Threat Intelligence, Radware
As the world migrates applications to new hemispheres and the Internet becomes more ubiquitous in business, bad actors are smelling new opportunities and attack vectors are forming like a dark storm cloud that is menacing digitalization initiatives. As you moved to remote work and accelerated your digitalization journey, a clear understanding of the threats helps you to better assess the risk and find the right balance to secure your assets and resources.
Join this session to:

  • Spot the threats to your businesses;
  • Understand who the bad actors are behind the threats; and
  • Learn about the tools they can use to disrupt your business.

1:10 PM – 1:20 PM ET
Visit exhibit hall

1:20 PM – 1:50 PM ET
Presentation by: Proofpoint

1:50 PM – 2:00 PM ET
Visit exhibit hall

2:00 PM – 2:30 PM ET
Presentation by: Insights

2:30 PM – 2:40 PM ET
Visit exhibit hall

2:40 PM – 3:10 PM ET
Presentation by:

3:10 PM – 3:20 PM ET
Visit exhibit hall