Preventing the rise of island hopping and counter incident response
Wednesday, December, 09th, 2020
The pandemic, a distributed workforce, and the U.S. presidential election have created a perfect storm for cybercriminals. Security and IT teams must stay on top of day-to-day operations, while also addressing new sophisticated threat vectors like counter incident response and island hopping.
Preventing, detecting, and responding to emerging threat techniques starts by understanding how cybercriminals are honing their ability to remain undetected inside organizations they’ve breached.
Attend this technical webcast with our security strategists and incident response experts to learn how to:
· address lateral movement behind most counter incident response attacks;
· understand how island hopping expands the attack surface area; and
· establish effective incident response in a longer-term distributed world.
Head of Cybersecurity Strategy
Tom Kellermann is the Head of Cybersecurity Strategy for VMware. Previously, Tom held the position of Chief Cybersecurity Officer for Carbon Black Inc. Prior to joining Carbon Black, Tom was the CEO and founder of Strategic Cyber Ventures. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service. On January 19, 2017, Tom was appointed the Wilson Center’s Global Fellow for Cyber Policy.
VMware Carbon Black
Rick McElroy, Security Strategist at VMware Carbon Black, has 20 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. He has held security positions with the U.S. Department of Defense, and in several industries including retail, insurance, entertainment, cloud computing, and higher education. As a United States Marine, McElroy’s work included physical security and counterterrorism services.
Senior Threat Analyst
VMware Carbon Black
As a Senior Threat Analyst Shift Lead with VMware, Taree Reardon has been fascinated with identifying and dissecting new and emerging threats. During her time at VMware, she has helped identify and analyze several new attack variants, including one of the first known uses of the BlueKeep exploit in a customer’s environment.